e99 Online Shopping Mall
Help | |
Home - Book Author - Schwartau Winn (Books) |
  | 1-11 of 11 |
click price to see details click image to enlarge click link to go to the store
1. Cybershock: Surviving Hackers, Phreakers, Identity Thieves, Internet Terrorists and Weapons of Mass Disruption by Winn Schwartau | |
Paperback: 496
Pages
(2001-03-30)
list price: US$16.95 -- used & new: US$2.20 (price subject to change: see help) Asin: 156025307X Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Book Description Customer Reviews (20)
Buy it used and save yourself $20
Worse book on the subject
Interesting Stuff
A Hacker's Thoughts on cyberSecurity And it's not the technical details that should scare you, though there's enough of that. It's the simple "social engineering" that can cost you hundreds of thousands of dollars. A good hacker doesn't need to touch a computer - he just picks his target, gains a bit of information and uses others to do the dirty work, all unsuspecting. By the time you work out you are under attack, someone has taken out a second mortgage on your home, cashed in your life insurance, raided your credit cards and had a hell of a good time at your expense. Here are case studies to demonstrate it. people driven to bankruptcy, despair and suicide. Get a firewall on your computer right NOW. And do all the other things this book advises. Otherwise you are a mug. Don't figure it won't happen to you - if you are at all active in cyberspace, then you are leaving footprints behind that can be picked up and exploited by a hacker looking for his next target. Buy this book - it will be the best handful of dollars you ever spent.
One-stop course to common sense on the net I especially recommend the section on how to keep your kids safe on the net... this book is a one-stop course to common sense on the internet. ... Read more |
2. Information Warfare: Second Edition by Winn Schwartau | |
Paperback: 768
Pages
(1996-11-01)
list price: US$18.95 -- used & new: US$3.99 (price subject to change: see help) Asin: B00127UJMO Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Customer Reviews (8)
Still a Best in Class Endeavor
Very important book
An excellent resource
NEED TO READ
Great book for those not into computer security. |
3. Pearl Harbor Dot Com by Winn Schwartau | |
Mass Market Paperback: 512
Pages
(2002-01-01)
list price: US$9.99 -- used & new: US$2.88 (price subject to change: see help) Asin: 0962870064 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Book Description Customer Reviews (10)
Oh no another non-technical computer "cyberthriller"
PsyOps Instructor Several years ago, in his bestselling novel Debt of Honor, Tom Clancy scratched the surface of economic information warfare.In Pearl Harbor.com, Winn Schwartau takes the reader through a weeks-long attack against the national information infrastructure. However, the book is not only a thirller.It is throught-provoking in a number of ways, exploring the true psyche of the hacker community; the dependance that Western Civilization now has on Computers; and the spectre of "what if we had to live without it." This book is must-reading for anyone who has anything to do with information security, homeland defense, or economic security. Schwartau's latest book is not only a thriller, but is a wake-up call that clearly shows the dangers of ignoring our critical information systems.
Big on concept, small on execution The period of denouement was exciting and fun, but I found the ultimate resolution almost entirely unbelievable.The remedy just plain wouldn't work, and at some level that's the point of the book.I think he shied away from the apocalyptic ending he had planned, and the result -- at least for me -- meant that the plot ended with a wimper, and that was most of what this book had going for it. The real protagonist of this story is the internet, and the author definitely knows his computer vulnerabilities.This could work as a teaching story; but that just isn't interesting enough for 500+ pages of fiction.I think this work would have benefited from some aggressive editing.If you are a layman technologist, want some lightweight introduction to computer security, you might enjoy this book.In particular, for anyone unaware of the risks that accompany the benefits of our online, interconnected civilization, this book could be a very interesting read. As for me, I found it thin and overlong.
Miles to go before we sleep
Pearl Harbor Dot Com |
4. Time Based Security by Winn Schwartau | |
Paperback: 192
Pages
(1999-02-01)
list price: US$25.00 -- used & new: US$8.45 (price subject to change: see help) Asin: 0962870048 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Customer Reviews (5)
As a book, not so great; as a concept, exceptional
Very Sloppy Work
Some good ideas but a lot of gaps
One of the few classics in its field The only bad things you could say about it, is Winn's use of storytelling (even if I found it enjoyable and effective), and the shoddy printmanship of the book (unclear pictures and bad illustrations, but that may be Winn's doing again). Regardless of all complaints you may have against it, it needs to be read and understood, as well as being integrated into the curriculum of CISSP and equivalent certifications.
A must have for anyone interested in information security! This book is the only book on my shelf I recommend*everyone* (interested in security) read.It is ground breaking because itstarts from scratch and looks at the function and follows with what theform should be.I think this book is a decade ahead of it's time and thatuntil every programmer, consultant, system architect, and info-sec employeeread this book and the information becomes ingrained as common sense willsecurity be truly possible in any meaningful way. Most importantly itgives useful information on how to apply this information right now, adecade before we have good competition in the security product market placethat will solve this kind of problem.If you plan on doing any kind ofintrusion detection,the information in this book must be at your fingertips... It is the only way to measure how well solutions deliver, and tocreate meaningful metrics for measuring information security solutions. The book has a certain prose about it that keeps on building on theprevious idea, and hence seems to be repeating itself, however it is ashort book that everyone from CEO to "in the trench guy" canread.Keep reading and thinking about what is being presented to youhowever and I think you will find as I did that the book is way ahead ofit's time and you will soon be building a secure infrastructure for yourbusiness that you can measure, and justify. ... Read more |
5. Terminal Compromise by Winn Schwartau | |
Paperback:
Pages
(1991-06)
list price: US$19.95 Isbn: 0962870005 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Customer Reviews (1)
The ORIGINAL Information Warfare Book of Books |
6. Information Warfare Chaos on the Electronic Superhighway by Winn Schwartau | |
Hardcover:
Pages
(1994)
-- used & new: US$18.95 (price subject to change: see help) Asin: B000J0WS6K Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Customer Reviews (1)
Collector's Item--Nailed the Future Back in the Day |
7. CYBERSHOCK by Winn Schwartau | |
Paperback:
Pages
(2000)
Asin: B000RB106U Canada | United Kingdom | Germany | France | Japan | |
8. Low cost computer security.: An article from: Security Management by Winn Schwartau | |
Digital: 7
Pages
(1994-06-01)
list price: US$5.95 -- used & new: US$5.95 (price subject to change: see help) Asin: B00092WQ3I Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Book Description |
9. Complete Internet Business Toolkit by Winn Schwartau, Chris Goggans | |
Paperback:
Pages
(1996-06)
list price: US$15.00 -- used & new: US$15.00 (price subject to change: see help) Asin: 0788165097 Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Book Description |
10. Cyberwars: Espionage on the Internet by Jean Guisnel | |
Paperback: 296
Pages
(1997-01-01)
list price: US$17.50 -- used & new: US$1.00 (price subject to change: see help) Asin: 0738202606 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Amazon.com To some a brand-new forum for the freedom of speech, the Internet is also the most up-to-date way to gather intelligence. Brilliant hackers like Kevin Mitnik-modern-day "pirates"-pose real security threats to government and industry. Cyberwars explores a dangerous new world where international terrorists plot their attacks and are tracked by secret service organizations on-line, drug traffickers do business and launder money, and electronic economic espionage is the order of the day. Examining efforts to police on-line communication and content, Guisnel assesses the implications of pervasive surveillance for the inherently democratic medium of the Internet. As these issues are the focus of ongoing debates in government and the private sector, Cyberwars couldn't be more timely. Customer Reviews (4)
D&M book review of CYBERWARS-ESPIONAGE ON The Internet In the recent flood of cyberspace publications, this book at best adds a mere trickle to the literature. While the author presents some interesting perspectives on United StatesÂÂFrench competition in industrial espionage (in fact, the book is translated into English from French), the faulty technical details present throughout ultimately sink this effort. The author's disconnect with technology stands out in his discussion of the Clipper chip, which is now installed in most standalone voice encryptors sold in the United States--but in few other applications. The author contends that the National Security Agency proposes to add the chip to every telephone manufactured in the United States. This statement is both illogical and wrong. Analog phones, which can't take chips, continue to be widely manufactured because they are far more affordable than digital phones. Moreover, digital phones are generally hooked to analog lines and don't use encryption. Thus, installing Clipper in all phones makes no sense. The author even confuses commonly known security details. In a discussion of phone phreaking, for example, he claims that the publication titled 2600 was named after the frequency generated by a quarter as it plunks into the slot in a pay phone. In fact, the publication's title derives from the frequency in hertz of a supervisory tone used to bypass toll equipment. And in places the book lapses from a balanced discussion into political commentary. For example, after criticizing filtering programs that block access to pornographic and other objectionable Web sites, the author states that "The fun for those who devote themselves to censorship is the daily discovery of new sites that they can condemn and prohibit." Instead of providing new material, this book is essentially a collection of accounts of computer intrusions previously published in newspapers. Security managers seeking a digest of hacking articles might find some value in this book, but it is not recommended for serious practitioners. Reviewer: Gordon Mitchell, Ph.D., manages Future Focus, a Seattle-area company that gathers clues from hard disks for commercial clients. He is a member of ASIS. D&M company for scientific research
European Perspective on Cyberwar
A pseudo-tech book written by someone who hasn't a clue. The author's disconnect with technology isdemonstrated in his discussion of the Clipper chip.Clipper is nowinstalled in most stand-alone voice encryptors that are sold in the US.Atthe beginning of each phone call a new session key is shared between thetwo callers.It is not practical to find this session key by guessing buta separately encrypted version is sent along with the conversation.Thesession key can be discovered by government agencies through appropriateprocedures.The author's discussion of this states that a NSA proposal"...would add a device called the clipper chip to every telephone orcomputer manufactured in the United States."For most phones that useanalog transmission of voice this would clearly make no sense.Apparentlythe author missed the issue entirely. In places the book becomes more ofa political platform than a balanced discussion.After condemningfiltering programs that block access to porn sites he states that "Thefun for those who devote themselves to censorship is the daily discovery ofnew sites that they can condemn and prohibit" Even commonly knownsecurity details are missed.In a discussion of phone phreaking the authorstates that the publication titled 2600 was named after the frequency thata quarter made when falling into a pay phone.2600 Hertz is actually thefrequency of a supervisory tone that was used to bypass tollequipment. In an evaluation of the hacker Kevin Mitnick's his technicalabilities were rated as #2 in the world.I am personally aquatinted withassociates of Mitnick who state that he is a technical wannabe that excelsonlyin dumpster diving and social engineering. [exerpted from a reviewfor Security Management -- all rights reserved by the author]
Recommended?Click the 'Back' button. In one glaringly ignorant sentence he infers that published bomb-recipies are a phenomenon perpetrated solely by right-wing militia groups. Huh. On the subject of internet policing he wanders from: the idea that governments should not, to the idea that the internet is a "self-policing nirvana", to wondering how laws to prevent nazis from having websites could be enforced. If you are a regular study of this topic you will not find anything new here.Despite the intruiging title, this guy has nothing to say. ... Read more |
11. Internet & Computer Ethics for Kids: (and Parents & Teachers Who Haven't Got a Clue.) by Winn Schwartau | |
Paperback: 200
Pages
(2001-04-01)
list price: US$15.95 -- used & new: US$7.72 (price subject to change: see help) Asin: 0962870056 Average Customer Review: Canada | United Kingdom | Germany | France | Japan | |
Editorial Review Book Description The Title says it all. Internet and Computer Ethics for Kids (and Parents and Teachers Without a Clue) is going to be one of the most significant books of 2001. It discusses, in a non-technical language that everyone can understand, one of the most serious issues facing us today: Hackers, Hacking and Cyber-Ethics. 1. How should kids behave on the Internet? Cyber Ethics is an important mission that you will want to be a part of, and this book is only the first of a series of books that will be appearing in the coming three years on the subject, all talking to a wide variety of issues. CyberEthics for Kids and Families! Internet and Computer Ethics for Kids is the first book to actively promote family and youth values and cyberethics in an entertaining, colorful way. All About Internet and Computer Ethics for Kids! Internet and Computer Ethics for Kids is a colorful, extensively illustrated book written in an easy to understand, non-technical format. No other book has been specifically targeted at non-technical parents, teachers and kids who are in the greatest need of ethical education on issues they don't understand. This lack of cyber ethical knowledge: Unlike the small handful of older books which preach ethics and tell people how to behave, Internet and Computer Ethics for Kids does not preach or suggest what is right or wrong behavior. Instead, it provides situational conundra for the reader, the parent and the educator to discuss, evaluate and form the basis for personal ethics. Internet and Computer Ethics for Kids is written so everyone, from all walks of life and education can read it - and understand it. Customer Reviews (3)
Even teens will like it...
For Parents and their Kids together
A Great Book |
  | 1-11 of 11 |