Posted: Sat Dec 13, 2003 6:27 pm Post subject: Book Review - Steal This Computer Book 3
Steal This Computer Book 3
Author(s): Wallace Wang
Publisher:No Starch Press Book Specifications: Soft-Cover, 359 pages
Category: Internet Security
User Level: Beginner
Suggested Publisher Price: $24.95 USA/ $37.95 CAN/ £16.79 Net UK (inc of VAT)
Amazon.com:Steal This Computer Book 3
Info from Back: "Is your computer safe from computer viruses and malicious hackers? No matter how secure you think your computer is, it?s still vulnerable to a variety of attacks that can ruin your files or hoodwink you out of thousands of dollars. This newly revised third edition of the best selling ?Steal This Computer Book? will help you protect yourself?
After you have purchased your new computer there can be a bewildering amount of information you need to know in order to make your online journey a safer one. It can be difficult for the newcomer to find a book, which will cover the wide array of topics that they invariably will ask about. There is not only security to worry about, but also how to go about finding the information or site that one requires. An abundance of resources on the web will answer these questions, however to find them you need a starting point to show you the way. In this book the new web traveller will find a plethora of information with which to help them on their new journey into cyberspace. This book will also help allay some fears that a new computer user may have through detailed explanations of terms such as spam, and spyware which can be bewildering.
Content & Overview
Covering a large swath of information is really what this book does. From the basics of how to go about finding that information you want to chronicling some of the dangers facing the computer user today. It will show the reader just where to go to find that url your looking for via a search engine, whether it be a specialized or generic one. Also shown to you are alternative sources of news and information. Discussed also is information on the threats faced daily while surfing the web. Not only are computer virii and trojans covered, but also the more insidious dangers such as online stalkers, and con games. These topics are covered over 5 parts and several appendices.
Part I. Information Overload (Lies, Damn Lies, and Statistics)
Part II. Dangerous Threats on the Internet
Part III. Breaking and Entering Computers
Part IV. Protecting Yourself
Part V. Protecting Your Computer
Other topics covered are the ways in which a malicious hacker goes about their business. Shown are some of the more well known scans such as the Syn and Fin scans to name a few through, which they will find out if you have left open any doors into your system. Not to be ignored in this book either are the ways that one can and should employ to protect oneself. This is shown through the application of firewalls, anti-virus software, and other programs like spyware finders. These will show you how to apply various layers of security to help protect your computers sensitive information.
Style and Detail
Featured in this book are a large variety of screen shots displaying many of the tools shown in this book. The writing style itself is lean and to the point without being overly cluttered with hacker jargon. Of note in this book is the good overall picture it will render to the reader in terms of overall dangers and resources, which can be found on the web.
Not only will you be introduced to the various ways to dig out information, but also in how to find information about various domains and addresses. At the end of the book contained within the appendices is a large offering of software tools with which one can protect, and help anonymize your online experiences.
A good job is done in educating the user about the wide variety of dangers, and resources which comprise the web. Presented in a logical grouping of links, and categories are some excellent tools. One area that the book needs to be updated on though is the selection of tools that are outdated now. Even though only one year has gone by the tools themselves are dated. Beyond that this is an excellent read for the novice computer user. I would recommend it for all new computer users as a preliminary read. That being said it should be noted that this books intended audience is not the power user, or the already computer savvy netizen.
This book gets an SFDC 7/10 from me
Keywords for this post: Steal This Computer Book 3
This review is copyright 2003 by the author and Security-Forums Dot Com, and may not be reproduced in any form in any media without the express permission of the author, or Security-Forums Dot Com.
Last edited by alt.don on Sat Dec 13, 2003 8:31 pm; edited 1 time in total
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot edit your posts in this forum You cannot delete your posts in this forum You cannot vote in polls in this forum