The Blue Nowhere: A Novel [Jeffery Deaver] on *FREE* shipping on qualifying offers. His code name is Phate — a sadistic computer hacker who. How do you write a truly gripping thriller about people staring into computer screens? Many have tried, none have succeeded—until now. Leave it to Deaver, the. The Blue Nowhere will forever change the way you feel about your computer. Jeffery Deaver, bestselling author of The Empty Chair and The Bone Collector.

Author: Zukinos Tazragore
Country: Cameroon
Language: English (Spanish)
Genre: Health and Food
Published (Last): 13 July 2004
Pages: 437
PDF File Size: 18.71 Mb
ePub File Size: 8.71 Mb
ISBN: 477-8-18039-468-9
Downloads: 21994
Price: Free* [*Free Regsitration Required]
Uploader: Mazukinos

The Cybersecurity Canon: The Blue Nowhere

The Blue Nowhere is a cyber thriller written by an accomplished novelist about the hacking culture. A brilliant programmer, a cracker someone who breaks into another computer to do damage as opposed to a hacker who just breaks in to poke around for the thrill of beating the system is killing people and the Computer Ble Unit relaizes they are in way over the The ” nowhere” represents online space, that world of electrons that hackers and unline freaks lose themselves in.

Lara recalled another rule of urban protection: He wore combat fatigues and, despite the overcast and misty rain, sunglasses. Apr 21, John Blair rated it did not like it.

Thanks for telling us about the problem. The police are after a hacker by the name of Phate who is hacking into people’s computers, finding out information about them and then killing them deacer his assistant Shawn.

There was so much we got to watch unfold, so many deavet to watch come together. He’s received or been shortlisted for a number of awards around the world. Originally published on my blog here in October Lara found herself absently fondling the can of pepper spray she kept in her purse.

Of course, if you never go online, you would have nothing to worry about. Feb 25, M rated it really liked blur. It was one of those stories that kept you guessing, throwing out a lot of information that left nowhede with notions in your mind of what was to come. There he learns intimate details about his intended victim and ultimately murders them.

Will flagged down the bartender and ordered a light beer. Deaver’s nlwhere I was forced to get something else from the library. These two sported the blue cards of Sun Microsystems.


Another hacker or “cracker” in the terminology of the times, i. You can learn all day long with this particular book. I enjoyed the book. I will now seek out more of this books. Two expert hackers are at each other’s throats, literally, as one, Wyatt Gillette, assists the cops in identifying and tracking the other, a wizard known as Phate. Jeffery Deaver, bestselling author of The Empty Chair and The Bone Collector, now turns to the labyrinthine world of cyberspace — a world where safety is elusive, appearances are deceiving, and the most powerful can lose their wealth, their minds, their lives with a hacker’s touch of a button.

Based on a reference from a friend who knew of our lengthy career in real computer mainframes, we were afraid the computer terminology might be at deafer 4th grade level or else totally fictional and unreal. Still, the driver had seemed to stare at her with an eerie hostility. The police know that the only way catch Phate is to play him at his own game.

Just another example of this author’s genius! Bowhere editions – View all The Blue Nowhere: And a phishing attack is not “searching the Web for details on someone. Since the Trapdoor program is important to the plot, this is something of a problem; yet the convincing nature of the rest of the setting makes it easy enough deacer suspend disbelief and enjoy the novel.

You could usually count on the fact that if a hacker had any skill at all, he or she also spent some significant time crawling through multi-user dungeons MUDswhich are text-based adventure games that are the precursor to the World of Warcraft-styled games we see today. Assolutamente no, ovvio, e devo dire che ne sono estremamente lieto, dato che si tratta del primo romanzo dell’autore che mi piace veramente pur non avendo i suddetti protagonisti.

Deaver can spin a tale like no other! Price may vary by retailer. Every “cyber” word used is described in excrutiating nowhdre.

The Cybersecurity Canon: The Blue Nowhere – Palo Alto Networks Blog

Lara slid off the bar stool and walked to the window, glanced outside. Refresh and try again. Although this book is very technical for the uninitiated the computer gurus explain what is happening to the team of cops who don’t belong to the info.

The story has his usual twists and turns and surprises but certainly seems a bit over-populated in places a a few too many red herrings and what se Came across this in a pile of “take one, leave one” books in a local store and was surprised I had not read it before since I enjoy Jeffery’s work.


He starts off the book in prison for hacking into the Department of Defence computers and allegedly running a piece of software that could encrypt their ‘unbreakable’ Standard 12 software. This story sucked me in instantly, and I found myself more than willing to keep turning the pages to see how everything came together.

As was the custom in the s, self-proclaimed hackers gave themselves nicknames.

There’s an unnecessary subplot about Wyatt trying to get back his estranged ex-wife that goes nowhere. Chi prova ad ostacolarlo?

The Blue Nowhere feels more like real people in a cyber story as opposed to a cyber premise populated with cookie-cutter characters.

Jeffery Deaver is best known in literary circles as a crime novelist. They enlist the help of Wyatt Earp — oops, Wyatt Gillette — another brilliant hacker currently in jail for having broken in to some defense department computers — to help them find Phate.

Unit 42 Sign up to receive the latest news, cyber threat intelligence and research from Unit42 By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. Lists with This Book.

Jeffrey Deavers portrays these souls as addicts in the same vein as alcoholics. So, a hefty 4 star rating is what it’s worth. Our expectations are that those lives are safe I find it ironic and creepy at the same time that the first murdered victim shown in book is Lara Gibson, which is dubbed as a woman who really knows how to take care of herself in a big city.

Wyatt Gillette, a convicted hacker jetfery time in prison, is called upon to help the police catch a hacker that gets into peoples computers, finds out everything he can about them, and then lures them close enough to him that he can stab them in the heart with his big knife. The reasons that systems are vulnerable to cracking are generally attributable to human carelessness, such things jeffeery users writing down passwords or using obvious words, or bugs in software which can be exploited.