Programming Books C Java PHP Python Learn more Browse Programming Books
Black Hat and over one million other books are available for Amazon Kindle. Learn more
Qty:1
  • List Price: $19.99
  • Save: $4.21 (21%)
FREE Shipping on orders over $35.
In Stock.
Ships from and sold by Amazon.com.
Gift-wrap available.
FREE Shipping on orders over $35.
Used: Very Good | Details
Sold by fiveisgreat2
Condition: Used: Very Good
Comment: Very good clean tight copy. Cover shows slight wear mostly light scratches.
Access codes and supplements are not guaranteed with used items.
Have one to sell? Sell on Amazon
Flip to back Flip to front
Listen Playing... Paused   You're listening to a sample of the Audible audio edition.
Learn more
See this image

Black Hat: Misfits, Criminals, and Scammers in the Internet Age Paperback – June 9, 2004

ISBN-13: 978-1590593790 ISBN-10: 1590593790

Buy New
Price: $15.78
37 New from $6.99 28 Used from $1.00 1 Collectible from $90.00
Amazon Price New from Used from
Kindle
"Please retry"
Paperback
"Please retry"
$15.78
$6.99 $1.00
Free%20Two-Day%20Shipping%20for%20College%20Students%20with%20Amazon%20Student


NO_CONTENT_IN_FEATURE

Save up to 90% on Textbooks
Rent textbooks, buy textbooks, or get up to 80% back when you sell us your books. Shop Now

Product Details

  • Paperback: 176 pages
  • Publisher: Apress (June 9, 2004)
  • Language: English
  • ISBN-10: 1590593790
  • ISBN-13: 978-1590593790
  • Product Dimensions: 9.1 x 6.3 x 0.5 inches
  • Shipping Weight: 9.1 ounces (View shipping rates and policies)
  • Average Customer Review: 3.7 out of 5 stars  See all reviews (12 customer reviews)
  • Amazon Best Sellers Rank: #1,811,165 in Books (See Top 100 in Books)

Editorial Reviews

Review

"Best of all, John Biggs' suggestions for protecting my computer…have made my cyber activities more comfortable and secure." -- Slashdot, http://books.slashdot.org, July 20, 2004

A good primer for those who don't know about the dangers that lurk on the Internet. Be careful out there. -- Blog: Scobleizer; July 2, 2004

About the Author

John Biggs is a skilled journalist with seven years of intensive, real-world experience in IT programming and management as well as a Master's degree in business and economic reporting/management. He is an expert in open source software, theory and technical aspects. Among the publications he has written for are: Linux Journal New York Times Popmatters.com www.deadmule.com www.toasted-cheese.com www.aphelion-webzine.com Laptop Tech Edge PC Upgrade Surge Pittsburgh City Paper In Pittsburgh Alternative Newsweekly

More About the Author

I live in Brooklyn, NY with my family and write about things I love including travel, trains, and mysteries. My work has appeared in the New York Times, Laptop, PC Upgrade, Surge, Gizmodo, Men's Health, InSync, Linux Journal, and TechCrunch. I'm from Columbus, Ohio and have worked as a programmer, cook, eyeglass grinder, waiter, and journalist.

Customer Reviews

The book does not come with any software, or any code samples.
Steven Pierce
Everyone who surfs the net, for whatever reason, should read a book like this just so they know what can happen.
Harold McFarland
I personally enjoyed reading it, knowing that there were a number of people I would recommend it to.
Thomas Duff

Most Helpful Customer Reviews

15 of 16 people found the following review helpful By Harold McFarland HALL OF FAMEVINE VOICE on June 28, 2004
Format: Paperback
This is easily one of the best books available today to teach the average person what goes on in the darkest corners of the Internet. Author John Biggs takes the reader on a mind-expanding journey into these areas where questionable characters are more the rule than the exception. Along the way you will learn about port scanning, viruses, spam, spyware, worms, scams, pirates, and hacking. This is one of the very few books that teach the reader what can happen and how to be prepared without becoming a book that teaches malcontents how to become a hacker. This makes it one of the very few books that I could recommend to high schools, youth groups, and adult groups who want to understand the dangers of the Internet.
"Black Hat" is a book that is long overdue for publication. Most books on this subject are too technical for the average reader; this one is the exception. Everyone who surfs the net, for whatever reason, should read a book like this just so they know what can happen. If you are a non-technical user then "Black Hat: Misfits, Criminals, and Scammers in the Internet Age" is the best book available today for this purpose. This book should be considered as a gift for friends and family you love that surf the net and need to be safe.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Paperback
I recently received a copy of Black Hat: Misfits, Criminals, and Scammers in the Internet Age by John Biggs from Apress. While the information technology professional might not learn anything new from this book, it will serve as a readable resource to help typical computer users to understand the threat to their well-being when they surf the internet.
The chapter selection is as follows: Black Hats: Things That Go Ping In The Night; Y.O.U MAYHAVE ALREDY 1!: SPAM; Deep Cover: Spyware; Shockwave: Worms and Viruses; Dear Friend: Scams; Upload Or Perish: Pirates; Break In: Hacking; Don't Get Burned: White Hats; Glossary; Selected Reading; Index
Biggs has written a relatively short (158 pages) book that deals with most of the major security risks an average user will face on a regular basis on the internet. For example, the chapter on spam starts off with a real-life scenario involving Alan Ralsky, a well-known spammer. You're then taken back to the early days of the 'net when the first generally recognized piece of spam made its appearance in UseNet. The growth of unsolicted mail is tracked to current day levels, as well as the reasons why spammers do what they do. He even takes a typical piece of spam mail and dissects the headers to show the reader how all is not as it seems in terms of where it came from and how it got to you. The current solutions, along with the pros and cons of each are discussed, in addition to where spam seems to be headed in the future. All this is done in a narrative fashion that stays at a level that is understandable to the average "Joe Computer User".
The chapter on scams is also very valuable for helping people avoid getting fleeced.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
6 of 6 people found the following review helpful By A Customer on June 20, 2004
Format: Paperback
This is security for the rest of us. How do worms work? What can we do to keep our information safe? How can we keep hackers, spam, and spyware off the family computer? This book as answers.
It's fun: there are little stories for each chapter and a lot of helpful info.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
5 of 5 people found the following review helpful By W Boudville HALL OF FAMETOP 1000 REVIEWERVINE VOICE on July 7, 2004
Format: Paperback
This is a very readable journey into the smarmy underside of the Internet. In straightforward, nontechnical prose, it explains the basic ideas behind spam and viruses and worms. Plus ostensibly benign spyware. And outright scams, that are a particularly pernicious subset of spam. Space is given to explaining about the Nigerian 419 and of phishers.
Then there is the explanation of downloading of copyrighted material (usually music). This differs from the others in that here millions actively participate. Whereas the others are pushed out to millions, most of whom decline.
The book is ideal for a person still new to the Internet, and worried about snares. It eshews a sensationalistic or preachy tone.
The only unfortunate thing is that it is pessimistic about defeating spam. The reasons give reflect the current consensus in the antispam field. But a few others, like myself, believe, based on our own works, that spam can indeed be crushed.
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again
Format: Paperback
Black Hat is an excellent, enjoyable read that tells the computer layman just about everything he needs to know about the dangers of online computing. If you've ever used a computer, you'll already be familiar with some of the topics discussed here - spam, viruses, online scams, etc. John Biggs takes you much further into these dire subjects, however, and I can almost guarantee that you will learn something you didn't already know - which is especially good, in that it can translate into better computer security for you. This isn't just a "what they are, what you can do" kind of book, though, as Biggs also takes you some way into the hacker community and lets you take a gander at the kind of mindset that drives all these script kiddies and outright criminals making our online experiences much less enjoyable than they could and should be. Hackers weren't always the spawn of Satan, and you will find a measure of respect in these pages for the hacker purist community, but that reflects the feelings of many computer experts. Your original hacker did it for the challenge, and I daresay software designers learned a great deal from these intellectually-oriented hackers - and what they learned has been incorporated into tighter, more secure software than we would have seen otherwise. There is a difference between these guys and the unscrupulous minds working their scripting magic to bring down networks or steal your personal data. The book ends on a positive note, as Biggs talks about the White Hats out there working silently to offset the dangers posed by today's Black Hats.

The book opens with an illuminating look at spam and some of the Spam Kings making money off what they consider to be a legal business method.
Read more ›
Comment Was this review helpful to you? Yes No Sending feedback...
Thank you for your feedback. If this review is inappropriate, please let us know.
Sorry, we failed to record your vote. Please try again

Customer Images

Most Recent Customer Reviews


What Other Items Do Customers Buy After Viewing This Item?