Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Hacking a terror network
Rogers R., Syngress Publishing, Sebastopol, CA, 2005. 364 pp. Type: Book (9781928994985)
Date Reviewed: Nov 3 2005

This fictional work tells the story of a terror network that uses the Internet to plan and (almost) carry out its nefarious plans. The network is stopped by the good guys, who manage to break the code and stop the situation from happening at the last moment, to the sound of the bugles of the US Cavalry coming to the rescue. Hundreds, if not thousands, of similar thrillers are out there, and are usually better written.

But then, this book should not be thought of solely as a literary work. It is, rather, a primer on the security holes of the Internet, and how to exploit them, explained in detail, and at a level that the average high-school student (or potential terrorist?) can understand and learn from, complete with screen shots and tutorials on particular software. So why make it all public? The author and technical editor would undoubtedly explain their labor with the same words that Huff used to justify his classic book [1], by quoting the words of a retired burglar whose published reminiscences were a graduate course in lock picking: “The crooks already know these tricks; honest men must learn them in self-defense.” With this object in mind, the book does its job well. If you did not give enough respect to steganography and its potential for harm before, you definitely will after finishing this volume.

There is a disturbing subtext, however: the security holes explained here are among those that have been detected, and the use of them can be countered. Are there any others out there that only the terrorists know of? For this answer, we may have to wait for the author’s sequel.

Reviewer:  Jonathan Golan Review #: CR131985 (0609-0876)
1) Huff, D. How to lie with statistics. W. W. Norton & Co., New York, NY, 1954.
Bookmark and Share
  Reviewer Selected
 
 
General Literary Works (A.0 ... )
 
 
Code Breaking (E.3 ... )
 
 
Unauthorized Access (K.6.5 ... )
 
 
Security and Protection (K.6.5 )
 
 
Data Encryption (E.3 )
 
Would you recommend this review?
yes
no
Other reviews under "General Literary Works": Date
3:16 Bible texts illuminated
Knuth D., A-R Editions, Inc., Madison, WI, 1991. Type: Book (9780895792525)
Nov 1 1991
Hermes and the golden thinking machine
Tzonis A., MIT Press, Cambridge, MA, 1990. Type: Book (9780262700474)
Jul 1 1993
Hyperfiction
Coover R. The New York Times CXLIII(49, 496): 1-ff, 1993. Type: Article
May 1 1994
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy