Dear Hacker: Letters to the Editor of 2600 (Anglais) Relié – 18 juin 2010
|Neuf à partir de||Occasion à partir de|
- Choisissez parmi 17 000 points de collecte en France
- Les membres du programme Amazon Premium bénéficient de livraison gratuites illimitées
- Trouvez votre point de collecte et ajoutez-le à votre carnet d’adresses
- Sélectionnez cette adresse lors de votre commande
Les clients ayant acheté cet article ont également acheté
Descriptions du produit
Présentation de l'éditeur
For 25 years, 2600: The Hacker Quarterly has given voice to the hacker community in all its manifestations. This collection of letters to the magazine reveals the thoughts and viewpoints of hackers, both white and black hat, as well as hacker wannabes, technophiles, and people concerned about computer security. Insightful and entertaining, the exchanges illustrate 2600′s vast readership, from teenage rebels, anarchists, and survivalists to law enforcement, consumer advocates, and worried parents.
Dear Hacker is must reading for technology aficionados, 2600′s wide and loyal audience, and anyone seeking entertainment well laced with insight into our society.
- Question Upon Question
- Tales from the Retail Front
- The Challenges of Life as a Hacker
- The Magic of the Corporate World
- Our Biggest Fans
- Behind the Walls
- A Culture of Rebels
- Strange Ramblings
For more information and sample letters, check out the companion site at http://lp.wileypub.com/dearhacker/
Biographie de l'auteur
Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.
Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.
Détails sur le produit
Commentaires en ligne
Commentaires client les plus utiles sur Amazon.com (beta)
I couldn't read this book from cover-to-cover in a few sittings the way I might a non-anthology book since, after a while, the letters became too much of the same despite their different topics. Even the editors' comments started sounding like more of the same. Instead, this book is best read by section, in chronological order, to give a sense of how technology and the issues that accompany it have progressed over the years. The clueless and the marginally insane among the letter writers can be both entertaining and sad; however, some of the letters are incredibly articulate about matters that go beyond criminal activity and into the realm of pure technology and common sense. And I really enjoyed the sense of history created by the dated letters. For example, I knew, but had forgotten, about the original hackers -- the phone phreaks of the eighties-- and how they worked more to conquer the limitations imposed by phone companies (or even just ATT, when there was only one) than to invade individual corporations since the internet was not yet prevalent enough to provide an entry into all aspects of American life. The section of letters written by prisoners focuses almost exclusively on how to circumvent prison phone restrictions; however, later letters by the incarcerated touch on matters of civil liberties, the issue of rehabilitation versus banned computer use, and a few others. That 2600 gave these largely ignored individuals a voice is remarkable, even if some of those voices are just trying to commit another crime, this time from behind bars.
As a cultural document, this book offers a sampling of the history of computer technology and the people who hope(d) to harness it, and for that, it's worth reading. Don't expect any articles or special insight into computers or hacking, however, since these letters were written mostly in response to articles that non-subscribing readers are unlikely to be familiar with. Still, you don't need the articles to understand the letters because most passages are relatively superficial. The more complex entries stand out and are probably the most interesting, but their technical expertise may be difficult to follow for the layperson.
-- Debbie Lee Wesselmann
This thick volume contains a very large sample of these letters, and while there's a good deal of variety in the themes of the writers, there's also a good deal of repetition. How many indictments and defense of Kevin Mitnick do we really want to read? How many ways can Goldstein make fun of someone asking the same dumb question? Still, I find myself repeatedly returning to the book, even if just to read a few letters before putting it aside again.
Of all the various themes, I find myself most interested in the reports of obscure hacks of old telephone and computer systems While most of the practical information on systems and networks is old enough that probably no longer of any real use, it's still pretty interesting to someone who's been working in and around computer systems for almost 40 years.
If you're a regular 2600 reading, no doubt you've already ordered your copy. My review is really aimed more at the technically inclined non-hacker with a curiosity about the world of hacking, phreaking, and related activities. For them, this book (and the earlier "Best of" volume) will provide and interesting and entertaining introduction into that culture.
The other book, The Best of 2600: A Hacker Odyssey now reprinted in a more expensive The Best of 2600, Collector's Edition: A Hacker Odyssey is absolutely essential and the other half of this set.
Hats off to Wiley for having the brains to see the value, and the editorial talent to select, edit, and present so perfectly. This book, thick as it is, has exactly the right amount of white space, the selection and use of fonts is just right, and the index, while not as extensive as I would have liked, is adequate.
"Look Inside the Book" has been set in motion, in the meantime, here is the table of contents that runs from the early days in the 1980's up through today, with absolutely phenomenal selections that provide priceless insights into the mindsets of BOTH bona fide hackers AND the clueless wanna-bes.
1. Question Upon Question
2. Tales from the Retail Front
3. The Challenges of Life as a Hacker
5. Our Biggest Fans
6. Behind the Walls
8. A Culture of Rebels
9. Strange Ramblings
Easily half if not more of the value of the book is to be found is the witty, acerbic, funny, insightful, surprising comments of the author Emmanuel Goldstein (not his real name), who has single-handedly but with many willing volunteers created the legitimate means of enabling information sharing and sense-making among hackers, who I am often at pains to describe as being the same as astronauts and pioneers, pushing the edge of the envelope.
This books is more fun than the first, but both are necessary in any responsible library seeking to understand both the good of hacking, and the idiocy and lack of ethical engineering in government and business that makes hacking so necessary.
Other books in this area that I recommend:
The Second Self: Computers and the Human Spirit, Twentieth Anniversary Edition
Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition
The Hacker Crackdown: Law And Disorder On The Electronic Frontier
Free Software, Free Society: Selected Essays of Richard M. Stallman
The Virtual Community: Homesteading on the Electronic Frontier
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Stealing the Network: How to Own a Continent
See also this DVD:
Hackers (features Emmanuel as the skateboarding hacker, he was a consultant to this film)
The DVD The Net with Sandra Bullock, and the Matrix movies, as well as Bruce Willis in Live Free or Die Hard are all worth looking at.