Pagina principaleGruppiConversazioniAltroStatistiche
Cerca nel Sito
Questo sito utilizza i cookies per fornire i nostri servizi, per migliorare le prestazioni, per analisi, e (per gli utenti che accedono senza fare login) per la pubblicità. Usando LibraryThing confermi di aver letto e capito le nostre condizioni di servizio e la politica sulla privacy. Il tuo uso del sito e dei servizi è soggetto a tali politiche e condizioni.

Risultati da Google Ricerca Libri

Fai clic su di un'immagine per andare a Google Ricerca Libri.

Counting from Zero di Alan B Johnston
Sto caricando le informazioni...

Counting from Zero (edizione 2011)

di Alan B Johnston

UtentiRecensioniPopolaritàMedia votiCitazioni
4310587,483 (3.05)1
Can a security expert save the Internet from a catastrophic zero day cyber attack by a network of zombie computers, known as a botnet? At what cost? "Credible and believable, this story is told by a subject matter expert. I could not wait to find out what happened next." - Vint Cerf, Internet pioneer"The threat to the Internet from worms, viruses, botnets, and zombie computers is real, and growing. Counting from Zero is a great way to come up to speed on the alarming state of affairs, and Johnston draws you in with his story and believable cast of characters." - Phil Zimmermann, creator of Pretty Good Privacy (PGP) the most widely used email encryption programToday, every computer connected to the Internet is under constant attack from viruses, worms, port scans, and spam. Security professionals continually fight to contain newly unleashed cyber attacks, known as 'zero day' attacks, only to have new attacks launched. Millions of computers have already succumbed, and, without their owner's knowledge, have become slave computers - remotely controlled 'zombies'. Under the control of organized crime and backed by foreign governments, these computers are morphing into collections known in the industry as botnets, short for robot networks.Internet security expert Mick O'Malley is the only one who recognizes the growing threat of the ultimate zero day attack on the Internet from a massive botnet, and his unique hacker skills and network of colleagues enable him to fight back. More cyber prep than cyber punk, Mick uses real-life tools and techniques to encrypt all his communications, and uses these skills to break the encryption used by the botnet. Mick uses encryption on a personal level, too, having multiple passports and multiple names and identities. While crisscrossing the globe in the air, on land, and at sea investigating the threat, Mick becomes the target of attacks on his reputation, his identity, and ultimately his life.Along the way, Mick meets Kateryna Petrescu, a beautiful Romanian firewall expert. Mick's attraction to Kateryna develops as they work closely together and share the excitement and danger. Why is the government following Mick and trying to intercept his communications? Can he stop the zero day attack before it is unleashed? What will be the cost to Mick for his single mindedness?Unfolding across three continents, the new techno thriller "Counting from Zero" gives a realistic insider's view of the thrust and parry world of computer security and cryptography, and the very real threat of botnets.… (altro)
Utente:twilightnightout
Titolo:Counting from Zero
Autori:Alan B Johnston
Info:CreateSpace (2011), Paperback, 286 pages
Collezioni:La tua biblioteca
Voto:
Etichette:Nessuno

Informazioni sull'opera

Counting from Zero di Alan B. Johnston

Nessuno
Sto caricando le informazioni...

Iscriviti per consentire a LibraryThing di scoprire se ti piacerà questo libro.

Attualmente non vi sono conversazioni su questo libro.

» Vedi 1 citazione

This is not a math book. This is a book about computer security told in the form of a novel. In between the action packed chapters is an informative and useful addenda with security tips. I felt the overall theme of the book was too lone wolf. The brave individual fighting bureaucratic stupidity and corrupt corporations cupidity. ( )
  jefware | Apr 22, 2020 |
The author is certainly a subject matter expert on internet security and writes in understandable language about it. Unfortunately, fleshing out what sounded like a credible story and creating an enjoyable experience for the reader were beyond his reach. I'm sure his PhD dissertation was well-received, but deep subject matter expertise in a technical area doesn't often yield a great novel on the subject.

I liked the general topic of the book, but the problems I had were around how the flow of the story was interrupted by terrible dialogue, incredible occurrences, and annoying writing techniques (for example, the blog question and answer pages). Many of the situations described were very believable, such as the chapters centered on technical conferences, but overall it was far too dependent upon unlikely happenings to ring true. It seemed as if the writer veered off-course as soon as he moved out of the realm of internet security. That's too bad, since the premise of the book was really interesting and the story had a lot of potential.

This wasn't a bad book, but it wasn't well-written. ( )
  gmmartz | Jun 21, 2016 |
Questa recensione è stata scritta per gli Omaggi dei Membri di LibraryThing .
It was very apparent that the author was knowledgeable, and after reading his bio I can see that he truly is as smart as his character, but wasn't able to capture this reader. For anyone who loves the inner workings of the computer/hacker world this is a novel for you. Lay people stay away, takes too long to get the gist and by then you might have lost interest. I would like to see if this author continues with this story though - but the language needs to be more user friendly. ( )
  cwaldrum | Jan 9, 2012 |
Questa recensione è stata scritta per gli Omaggi dei Membri di LibraryThing .
Generally I love cyber-thrillers but I must admit I was disappointed with this book. The story was pretty well crafted and believable but the writing seemed disjointed and the characters were shallow. At times the book seemed to read like a travel diary. The author seemed to spend little time (or perhaps I should say words) developing and fleshing out the details of the settings. The characters, especially Mick, are one dimensional, lacking the depth and development needed for the reader to relate to the character. The plot was simple with each twist and turn easily anticipated by the reader. The book did have excellent detail concerning internet security (or the lack of), an important topic in today's society. ( )
  realfish | Aug 30, 2011 |
Questa recensione è stata scritta per gli Omaggi dei Membri di LibraryThing .
Woe is he who believes that passwords and virus protection software sufficient to safeguard internet users’ information from being reviewed, stolen or used to undermine individual freedoms.

***

Network administrators strive to use their advanced programming skills and encryption skills to protect computers and the information stored on them. Excerpts from an imaginary Security and Other Lies Blog are interwoven throughout the story to explain how administrators protect against a steady stream of security threats. In this story, administrators and programmers at the top of their field are so paranoid about the safety of the information on the internet that they use disposable cell phones, encrypt all correspondence and continuously change passwords.

Author Alan B. Johnston’s main character, Mike O’Malley, demonstrates extreme paranoia to obtain self preservation as one attempt after another is made on the internet, his accounts and even his life. World renowned for his skills, Mike uses many aliases, multiple passports, off shore accounts and untraceable modes of transportation to keep out of reach of government officials and those who plot to take over the internet, as he bounces from one continent to another. This fast paced book will have you running to your computer to feverously change all passwords, update virus protection and add additional firewalls. ( )
  bemislibrary | Jul 31, 2011 |
nessuna recensione | aggiungi una recensione
Devi effettuare l'accesso per contribuire alle Informazioni generali.
Per maggiori spiegazioni, vedi la pagina di aiuto delle informazioni generali.
Titolo canonico
Dati dalle informazioni generali inglesi. Modifica per tradurlo nella tua lingua.
Titolo originale
Titoli alternativi
Data della prima edizione
Personaggi
Dati dalle informazioni generali inglesi. Modifica per tradurlo nella tua lingua.
Luoghi significativi
Eventi significativi
Film correlati
Epigrafe
Dedica
Incipit
Citazioni
Ultime parole
Nota di disambiguazione
Redattore editoriale
Elogi
Lingua originale
DDC/MDS Canonico
LCC canonico

Risorse esterne che parlano di questo libro

Wikipedia in inglese

Nessuno

Can a security expert save the Internet from a catastrophic zero day cyber attack by a network of zombie computers, known as a botnet? At what cost? "Credible and believable, this story is told by a subject matter expert. I could not wait to find out what happened next." - Vint Cerf, Internet pioneer"The threat to the Internet from worms, viruses, botnets, and zombie computers is real, and growing. Counting from Zero is a great way to come up to speed on the alarming state of affairs, and Johnston draws you in with his story and believable cast of characters." - Phil Zimmermann, creator of Pretty Good Privacy (PGP) the most widely used email encryption programToday, every computer connected to the Internet is under constant attack from viruses, worms, port scans, and spam. Security professionals continually fight to contain newly unleashed cyber attacks, known as 'zero day' attacks, only to have new attacks launched. Millions of computers have already succumbed, and, without their owner's knowledge, have become slave computers - remotely controlled 'zombies'. Under the control of organized crime and backed by foreign governments, these computers are morphing into collections known in the industry as botnets, short for robot networks.Internet security expert Mick O'Malley is the only one who recognizes the growing threat of the ultimate zero day attack on the Internet from a massive botnet, and his unique hacker skills and network of colleagues enable him to fight back. More cyber prep than cyber punk, Mick uses real-life tools and techniques to encrypt all his communications, and uses these skills to break the encryption used by the botnet. Mick uses encryption on a personal level, too, having multiple passports and multiple names and identities. While crisscrossing the globe in the air, on land, and at sea investigating the threat, Mick becomes the target of attacks on his reputation, his identity, and ultimately his life.Along the way, Mick meets Kateryna Petrescu, a beautiful Romanian firewall expert. Mick's attraction to Kateryna develops as they work closely together and share the excitement and danger. Why is the government following Mick and trying to intercept his communications? Can he stop the zero day attack before it is unleashed? What will be the cost to Mick for his single mindedness?Unfolding across three continents, the new techno thriller "Counting from Zero" gives a realistic insider's view of the thrust and parry world of computer security and cryptography, and the very real threat of botnets.

Non sono state trovate descrizioni di biblioteche

Descrizione del libro
Riassunto haiku

Autore LibraryThing

Alan B. Johnston è un Autore di LibraryThing, un autore che cataloga la sua biblioteca personale su LibraryThing.

pagina del profilo | pagina dell'autore

Discussioni correnti

Nessuno

Copertine popolari

Link rapidi

Voto

Media: (3.05)
0.5
1
1.5
2 5
2.5 1
3 6
3.5 3
4 5
4.5
5

 

A proposito di | Contatto | LibraryThing.com | Privacy/Condizioni d'uso | Guida/FAQ | Blog | Negozio | APIs | TinyCat | Biblioteche di personaggi celebri | Recensori in anteprima | Informazioni generali | 205,881,341 libri! | Barra superiore: Sempre visibile