Then they take the father to a house they have with the idea he can help them capture the kids. By this time, the files have to have been copied to remote sites. The father is of no help. The kids aka nerds have switched cars with a friend. In addition, the sentinel computers at the software company have noted the break-in, so the FBI is called in. By chance, the chief nerd had done a little part time work at the company and one of the FBI agents had been attending nerd meetings, so connected the nerd with the break-in. Agent manages to contact the chief nerd, and they agree to meet in a parking garage.
Now it gets really stupid. Somehow, never explained, the goonyest Russian manages to show up at the garage and starts shooting at the nerds. The kids' computers and having the kids intact for interrogation would have been the halfway sensible objective.
Even though one of the FBI agents has extensive under-fire field experience, they behave like scared amateurs, and the goon gets away. No person and one computer got shot in the melee. I'm done. Novel was written by folks who know lots about computers, but the plot details are too illogical and inconsistent. I did learn a few new things about hacking before I gave up.
One person found this helpful.
Get to Know Us. Sell on Amazon Start a Selling Account. But, if these words make you draw a blank, I would recommend reading the story and stopping to check each reference when it pops up. Please try again later. The pain of seeing your research buried under threats of lawsuits, even though you are right and the issue youve uncovered is there to be exploited. Add to basket. Rating details.
Format: Kindle Edition Verified Purchase. It is apparent to me that Jayson Street is passionate about information security, and also that he can present and captivate an audience through his perspectives. His ability to tell the story of Bob and Leon suddenly thrust in a situation that is larger than they could imagine was very entertaining.
Although I do not think the storytelling is perfect, the plot and transitions in Part 1 of the story are not difficult to follow. I also found that the STAR section was very educational, finding several sources and perspectives that I had not found in my own explorations. On the downside, I think my experience would have been more complete if I had read the paperback version of the book, as the Kindle edition seemed to reference physical page numbers that do not exist in the Kindle version Kindle uses location IDs.
Despite the Kindle limitation, the book was nevertheless very enjoyable. Looking forward to the read.
Actually have not start to read this book, saw Jayson speak at Def Con this year, just fantastic speaker and funny as any Las Vegas acts. This is more for the Seller, just got it in, the book is in great shape. I've been so busy reading technical manuals that this was a great change of pace. Combines a fun crime thriller story with the details on the tools and processes the hackers used and how to defend against them.
Ever since I first saw Jayson Street speak I was hooked. The man is brilliant and, importantly, very modest and down to earth. So, as soon as I could, I picked up the book. Let me tell you, it's amazing.
The fiction at the beginning reads like a true page turner and manages to "dumb down" many concepts to a level Joe Sixpack can understand. It's a very engaging story, and the ending makes you want more. STAR, which is what many of you will buy the book for, walks you through many of the attack vectors and methods that hackers will use against your business. As the foreword says, this is a new method to get through to people about the importance of security. I recently picked it back up started over and couldn't read part 1 quickly enough. Part 1 instantly drew me into the story within the first few pages, the story gets off to an amazing start and I found myself sneaking in as much reading as I could.
I HAD to know what was going to happen next. Many of the techniques and methods were familiar to me, which put me that much closer to the story. I felt I could easily relate and simply couldn't wait until the next "hack" was performed. I really liked the STAR section Part 2 as well, mainly because if there was something I was unfamiliar with I could just look it up right there in the same book. The inclusion of this section AND the ability to treat it either as a stand alone reference OR an integrated part of the story was an excellent idea.
I plan on reading it again but starting with part 2 and looking back at the references of the story. AND looking for more easter eggs.
This book is also approachable from the standpoint of handing it to a manager, parent, or anyone else who may understand how to use computers as an interface to check their email and consider all this "hacking" to be black magic. I think it does a wonderful job of outlining the attacks so they are understood and easily digested. I can not recommend this book highly enough.
See all 21 reviews. Express deliveries are delivered via Royal Mail 1st Class. Expected to arrive within business days. Your satisfaction is very important to us. If you have any problems with your order please contact us first before leaving feedback and our excellent customer service help to resolve the issue.
Create lists, bibliographies and reviews: or. Search WorldCat Find items in libraries near you. Advanced Search Find a Library.