Commencez à lire The Best of 2600: A Hacker Odyssey sur votre Kindle dans moins d'une minute. Vous n'avez pas encore de Kindle ? Achetez-le ici Ou commencez à lire dès maintenant avec l'une de nos applications de lecture Kindle gratuites.

Envoyer sur votre Kindle ou un autre appareil

 
 
 

Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.
The Best of 2600: A Hacker Odyssey
 
Agrandissez cette image
 

The Best of 2600: A Hacker Odyssey [Format Kindle]

Emmanuel Goldstein

Prix conseillé : EUR 32,96 De quoi s'agit-il ?
Prix éditeur - format imprimé : EUR 35,88
Prix Kindle : EUR 19,47 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet
Économisez : EUR 16,41 (46%)

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 19,47  
Relié EUR 25,96  
-40%, -50%, -60%... Découvrez les Soldes Amazon jusqu'au 5 août 2014 inclus. Profitez-en !





Descriptions du produit

Revue de presse

" … The Best of 2600: A Hacker Odyssey is an important, amazing book that tells the story of these kids and adults as they explore a new frontier." —John Baichtal ( Wired Blog , August, 2008) "...a testament to a culture which thrived before computers and the internet mattered to most of the world." ( New statesman, September, 2008)

“…a testament to a culture which thrived before computers and the internet mattered to most of the world.”  New Statesman Thursday 4 September 2008

Présentation de l'éditeur

Since 1984, the quarterly magazine 2600 has provided fascinating articles for readers who are curious about technology. Find the best of the magazine’s writing in Best of 2600: A Hacker Odyssey, a collection of the strongest, most interesting, and often most controversial articles covering 24 years of changes in technology, all from a hacker’s perspective. Included are stories about the creation of the infamous tone dialer “red box” that allowed hackers to make free phone calls from payphones, the founding of the Electronic Frontier Foundation, and the insecurity of modern locks.

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 3128 KB
  • Nombre de pages de l'édition imprimée : 889 pages
  • Pagination - ISBN de l'édition imprimée de référence : 0470294191
  • Editeur : Wiley; Édition : 1 (6 juin 2008)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B001UQO3TM
  • Synthèse vocale : Activée
  • X-Ray :
  • Classement des meilleures ventes d'Amazon: n°319.725 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Souhaitez-vous faire modifier les images ?


En savoir plus sur l'auteur

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne 

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 4.5 étoiles sur 5  23 commentaires
50 internautes sur 56 ont trouvé ce commentaire utile 
3.0 étoiles sur 5 no surprises for readers of 2600 19 novembre 2008
Par Neurasthenic - Publié sur Amazon.com
Format:Relié|Achat vérifié
I remember finding my first issue of 2600, in a bookshop attached to an enormous, secretive government laboratory. Those were in the days after ESS but before the Internet (well, we had NNTP and SMTP and telnet, but HTML hadn't been invented). It seemed so illicit and exciting, I bought every issue I could find for years, and even wrote one article for them.

Over time, I read it less and less, both because the writing was generally bad, and because the revelations were often so weak. The Best Of book fairly reflects the content of the magazine -- it gives a good sense for the passions of a particular technological subculture, but much of what is here is dross.

So many articles were clearly written by people who did not know much, and who punt when they get to difficult work. "The encryption is done by a custom chip and, uh, you might want to decompile the EEPROM and see what's in there." Or they contain only trivial information, made to fill many pages through the inclusion of anecdotes about how the writer came to know the trivial information. (Four pages on how you discovered that ATMs run OS/2? The entire article could have been reduced to four words: "Many ATMs run OS/2.") And then there are the political articles, most of which are screeds about how the government and/or big companies are coming to take your freedom away, and their desire to be paid for your pirated movies proves it.

In some cases, it is hard to imagine how a given article was selected for inclusion in the magazine, let alone for reprinting in the book. An essay on the mathematics of lotteries is particularly weak, using high school level combinatorics to argue that nobody should ever play. The article contradicts a much more interesting essay earlier in the book in which the weaknesses in certain lotteries were revealed and methods for exploiting these weaknesses detailed.

The best material in the book is historical -- the stories of individual hacks, arrests, court battles, etc., by the people involved. Emmanuel Goldstein could have printed just those and had a better book while saving 550 pages.
6 internautes sur 7 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 An important part of the history of computing 25 août 2008
Par John C. Stepper - Publié sur Amazon.com
Format:Relié|Achat vérifié
The hacker ethos is beautifully captured in this anthology. I've often skimmed 2600 at bookstores but it was only when I went through this hefty tome that I realized how deep and rich are the culture and accomplishments of the hacking community.

More than just the cartoonish representation in popular media, the hacking movement is a testament to creativity and innovation. Rightly so, this book is a celebration of cleverness and ingenious engineering instead of the more malevolent applications.
6 internautes sur 7 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 A book on the history of hacking by the people who wrote the magazine on hacking 25 août 2008
Par Mr. Hacks - Publié sur Amazon.com
Format:Relié
Emmanuel Goldstien and his companions have written alot about hacking over the years, but now most of their writings have come together in tome form.

If there was anything you ever wanted to know concerting what hacking was like before the explosion of the Internet, or how hackers have been portrayed with biased by the media and in some cases the government, this is a must read book.

If you subscribe to 2600: The Hacker Quarterly or if you patiently wait at the book store or mail box for a new issue every three months, you will definitely want to pick up this book.

It will be interesting to see in the future, online hacker zines to try their hand at publishing their writings such as TOTSE and Phrack.
29 internautes sur 42 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Fifteen Years of Extreme Hacking on the Edge, Under-Priced! 19 juillet 2008
Par Robert David STEELE Vivas - Publié sur Amazon.com
Format:Relié
I am attending Hackers on Planet Earth (HOPE) in NYC this week-end, and have just spent time with this volume. Unlike the individual issues, all of which I have had in my possession over the years, this volume is HUGE, readable, indexed, and priceless. I mean that--PRICELESS.

The publisher is to be saluted for not only putting a great deal of effort along with the editor, the founder of 2600 Magazine and also of the HOPE conference, for making this volume a true reference work. I was immediately impressed by the selection of "best of the best," the organization of the material, the index, and the fact that the publisher moved away from the micro-print that was used to keep costs down on the volume of knowledge being transmitted in the individual journal issues, and instead went for a high-end glossy, "just right" white space presentation that should be in every Information Technology library across the country, and is also a collectible for anyone who pretends to know anything at all about information INsecurity.

If you got this far, this lovely volume, easily worth $60, is a real value at the much lower price being offered, and I hope enough people buy it to occasion a reprint or a second volume.

It merits comment that this is not just a volume of hand-picked items from a single journal. The editor and his closest colleagues created a community of over 30,000 hackers (whom I have always said are like astronauts on the edge with the "right stuff") and this volume LITERALLY represents the 30,000 who were decades ahead of the US Government, which is still--as are corporations and public utilities--largely stupid about information system security, to include our Supervisory Control and Direction (SCADA) systems, all of them on the Internet.

For a really good time on what the Chinese know and can do that we cannot, see my Memorandum, easily found online, <Chinese Irregular Warfare oss.net>. They brought Dick Cheney's plane down over Singapore in Feburary 2007, and when he got off to stretch his legs, told him exactly what they could do, and what the US would not be allowed to do. Thus did the power of the information age move East.

Other great Hacker books (the last one is the ultimate public hack, taking back the power):
Hackers: Heroes of the Computer Revolution
The Second Self: Computers and the Human Spirit, Twentieth Anniversary Edition
The Hacker Crackdown: Law And Disorder On The Electronic Frontier
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption
Collective Intelligence: Creating a Prosperous World at Peace

Three DVDs, the first based on the real-life of the editor of this book:
Hackers
The Net
Live Free or Die Hard (Unrated Edition)

There are two sets of hackers: these, and the ones who came out of the Homebrew Garage Club (Lee Felsenstein, Eric Hughes, etc) and tended to created businesses rather than live free. Bill Gates is certainly in that number, as are Stewart Brand and others. The most famous Free/Open Hacker in the first group is Richard Stahlman, whose book on the origins of Free/Open Source Software (F/OSS) is most recently complemented by Yochai Benkler's book on Wealth of Networks. With a tip of the hat to Nat at O'Reilly, open source software is Darwinism, while malware and proprietary software are Intelligent Design that is not so intelligence. VISTA by Microsoft is the biggest scam in history, for the first time forcing documents to be uniquely tied to the Microsoft operating system and not processable anywhere else. It is time for Microsoft to die, or come to its senses and put its money into F/OSS while monetizing the transactions. Bill Gates has called F/OSS communist. In my view, that makes Bill Gates a fascist. My money is on F/OSS.
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Hack The Planet (one book at a time!) 7 septembre 2009
Par Jaypoc - Publié sur Amazon.com
Format:Relié|Achat vérifié
2600: A Hacker Odyssey is an invaluable tome of knowledge, history and perspective on the hacker culture. It covers several topics of hacking, social engineering, telephones, security and more. If you're familiar with 2600 magazine, this is a must have. If not, get caught up with articles going all the way back to the beginning. Magazine Editor and author Emmanuel Goldstein and his crew have gone out of their way to organize such a great resource.
Ces commentaires ont-ils été utiles ?   Dites-le-nous

Passages les plus surlignés

 (Qu'est-ce que c'est ?)
&quote;
This situation is advantageous because the ARPANET has gateways to all of the networks we will discuss. Because of this and some properties we will discuss later, the ARPAnet has also been termed the InterNet. &quote;
Marqué par 5 utilisateurs Kindle
&quote;
acute understanding of the abuses of his own craft, that of the media in distorting facts to the point of creating fiction. Fugitive is the story of how just such irresponsible journalism turned computer expert Kevin Mitnick into the most wanted computer hacker in the world. &quote;
Marqué par 3 utilisateurs Kindle
&quote;
To get into this menu, you must enter the button sequence 4-2-3-1. &quote;
Marqué par 3 utilisateurs Kindle

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique