[CR has previously published a review of this book (see Review CR138977). The author of the book has written a rebuttal to the review.]
AUTHOR’S REBUTTALI agree with Lecarme that the book is overpriced. Unfortunately, I have no say in that; it’s up to the publisher. The chapter notes were actually marked in the margin, so one could easily identify when a note existed, but these got chopped off without any warning when the book was published. Again, I agree with Lecarme--they are difficult to use in their current form.
I will, however, disagree with him about the programming examples and whether readers would be able to build (anti-)spyware. My reasoning for avoiding code examples is given in part in the preface, and there are clear issues involved with supplying malicious code. Also, the students I normally teach are already skilled programmers. Once the ideas and mechanisms are explained, that’s sufficient for them to implement something.