TomFolio.com Home Independent Dealers
For those who care about books!  
HOME CODE OF ETHICS BOOKDEALERS BROWSE BOOKS ANTIQUES COLLECTIBLES DETAILED SEARCH VIEW CART
 Other Areas
Advanced Search
Browse Book Categories
Antiques Collectibles
Browse by Dealer
Author Autographs
Author Awards
Author Biographies
Author Pseudonyms
Collecting Information
Glossary of Terms
Helpful Sites
Publisher Information
Customer Account
Account Log-out
Help
Contact Us
About TomFolio
For Bookdealers
Code of Ethics
Secure Shopping
Privacy Statement
Legal Information
Become a Member
Members Only

 Search Items
By Author:

By Title:

By Keywords:

By ISBN:

Advanced Search
Tom
  
Items By Category: All Categories: Computers and Internet
4 items found.   List items by:   Author     Title     Publisher
1.   Landreth, Bill (aka 'The Cracker')
Out of the Inner Circle, the true story of a computer intruder capable of cracking the nation's most secure computer sys
  Picture
Publisher: Tempus, Microsoft Corp., Redmond WA 1985, 1989; 230 pages, index
Very Good, oversized softcover white glossy decorated covers; slightly thumbed but binding is secure and sound, pages clean, unmarked

'the story of adeolescent ingenuity and intelligence mixed with high-stakes corporate and government intrigue... Included are details of some of the more notorious capers of the Inner Circle -- how these intruders penetrated the nation's largest and most sensitive computer networks with nothing more than several hundred dollars' worthe of computer equipment, and how they were ultimately caught.... Also a valuable computer security handbook, which provides a security checklist of the loopholes exploited by computer intruders in the mini and mainframe computers and their operating systems...' (from the rear cover) Microcomputers and Security

Appr.: | AUD 3.49 CAD 3.37 EUR 2.40 GBP 1.91 JPY 300.00 MXN 37.50 ZAR 32.61 

Purchase direct from: oldcomputerbooks.com. Item number: M687.

    
US$3.00
Order From Dealer
2.   Levy, Steven
Crypto -- How the Code Rebels Beat the Government; Saving Privacy in the Digital Age
  Picture
Publisher: Viking, NY, 2001, 356 pgs, Notes, Glossary, Bibliography, Index
Very Good or a bit better, hardcover, in Near Fine dustjacket & clear dustjacket protector; with black felt-tip remainder mark along bottom of textblock, otherwise pages are clean, binding is tight, flap of jacket unclipped. A nice copy of thisThe Loner; The Standard; Public Key; Prime Time; Selling Crypto; Patents & Keys; Crypto Anarchy; The Clipper Chip; Slouching Towrd Crypto; Epilogue- The Open Secret 'The first full-scale account of the great Code War that ... lucidly outlines the development of a 'people's' cryptography and its head-on collision with the US government. Crypto is about privacy in the information age and about the nerds and visionaries who, over 20 years ago, predicted that the Internet's greatest virtue -- free access to information -- was also its most perilous drawback -- a possible end to privacy...'(from the flap) Covers public key encryption & solution, anonymous digital money, cypherpunks like Whit Diffie, Paul zimmermann and David Chaum... the human story of the breakthroughs...'

Appr.: | AUD 6.98 CAD 6.75 EUR 4.80 GBP 3.82 JPY 600.00 MXN 75.00 ZAR 65.22 

Purchase direct from: oldcomputerbooks.com. Item number: C06123.
    
US$6.00
Order From Dealer
3.   Schneier, Bruce
Applied Cryptography -- Protocols, Algorithms, and Source Code in C
  Picture
Publisher: John Wiley & Sons NY 1994; 618 pages, Index, references, some illustrations
Very Good overall, glossy dark blue illustrated cardstock covers, thick softcover. Scuffs and some wear to covers. Binding is sound and secure, pages are clean and unmarked

'data security expert Bruce Schneier details how programmers can use cryptography, the technique of enciphering and deciphering messages, to maintain the privacy of computer data...

how security can be built into the computer software and systems. Along with more than 100 pages of actual C source code of working cryptographic algorithms.

Explains data encryption protocols and techniques in use; from secure correspondence to anonymous messaging; numerous source code fragments and how to incorporate them into larger programs; related issues like patents, export law and legal rulings, much more



Appr.: | AUD 17.44 CAD 16.87 EUR 12.00 GBP 9.55 JPY 1,500.00 MXN 187.50 ZAR 163.04 

Purchase direct from: oldcomputerbooks.com. Item number: M551.
    
US$15.00
Order From Dealer
4.   Wang, Wallace
Steal This Computer Book -- what THEY won't tell you about the Internet
  Picture
Publisher: No Starch Press, San Francisco CA 1998; 340 pages, index, some illustrations
Very Good overall, glossy large softcover, 'thumbprint' and 'fingerprint' illustrations on cover. Prev. owner's name rubberstamps along textblock fore-edge and endpages. Small corner tear lower rear cover. BInding is secure and tight, pages are clean and unmarked'No matter how secure your computer is, it is still vulnerable to a variety of attack that could steal your data, wreck your files, or even hoodwink you out of thousands of dollars...' (from the rear cover. 'Will inform, educate and maybe even shock you with the methods hackers use to crack the defenses of even the most secure computer...'Sections include -- Thinking Freely; Breaking Free; Fighting Back; Appendices - glossary; more'Just remember -- People who think for themselves can be more dangerous than all the weapons in the world.' (--from the introduction)

Appr.: | AUD 6.98 CAD 6.75 EUR 4.80 GBP 3.82 JPY 600.00 MXN 75.00 ZAR 65.22 

Purchase direct from: oldcomputerbooks.com. Item number: M490.
    
US$6.00
Order From Dealer

4 items found

Home   Contact Us   Bookdealers   Browse Books   Detailed Search   Antiques Collectibles   Privacy Statement   Shopping Cart

Copyright © 2000 - 2014 TomFolio.com. TomFolio is a registered
trademark of ABookCoOp, Inc. All rights reserved. Legal Information.