Used price: $138.74
I actually like the question and answer format, which makes it fairly easy to find the exact information you are looking for. The index and tables are also well done. The other nice feature is that the book not only gives the rules and how to comply with them (for example, periodic reporting, Rule 144, short-swing profits, insider trading, etc.) but also the rationale behind the rules and historical background.
Overall, a good investment and a five-star rating.
Used price: $0.97
Collectible price: $9.53
Used price: $13.50
Buy one from zShops for: $12.00
List price: $18.00 (that's 30% off!)
Used price: $2.99
Buy one from zShops for: $7.00
It's not a masterpiece of literature, but it was interesting enough to forever change my research career.
List price: $15.00 (that's 30% off!)
Used price: $5.39
Collectible price: $7.21
Buy one from zShops for: $8.54
I read this as research for a writing project; I use computers, I like computers, but by the end of the book I was wrapped up in a world of people who are consumed by the curiosity of what a computer is capable of. All the of real people that Levy writes about are interesting and vibrant in their own peculiar ways. And all the description of ingenuity and innovation in the sake of a good hack really gets you inspired.
I'm sure there are people who will take issue with Levy's selective coverage of the machines covered, debatably skewed emphasis on the bookish quality of the MIT group versus the crazy, do-it-yourselfers at Stanford, etc., and all of the people covered are not shown in a uniform light. But if you love computers, and would like to read about some really interesting people who accomplish some pretty amazing things, then this is a book for you.
Consider: in a closed, self-policed environment, like the computer labs of the 1960s and early 1970s, freely sharing information makes sense. In an open, under-policed environment, like the modern Internet, deviants abuse the Hacker Ethic. Well-intentioned "white hats" may explore the phone system purely to understand its operation, but evil-minded "black hats" abuse the same knowledge to make free long distance calls. Does this mean information should be confined? No -- full disclosure is still the best way to counter black hat activity.
Steven lays the groundwork for these thoughts, and serves up gems from hacker history. His 1970s quote from Popular Electronics editor Les Solomon is the earliest reference I know linking hacking to kung fu: "The computer is...an art form. It's the ultimate martial art." Steven also shares tales of Sierra On-Line, Apple Corp., Homebrew Computer Club, the Altair, and even Bill Gates' 1975 rant against software piracy.
"Hackers" will make you appreciate your unlimited access to the machine on which you're reading this review. Hackers of the 1960s and 1970s would have given their first born child to possess the power and availability of modern PCs; now we take PCs for granted, like indoor plumbing or refrigeration!
Those who lived the early days of PCs will enjoy Steven's trip down memory lane. Those who are younger will discover the true meaning of the word "hacker" -- one who promotes access, freedom, decentralization, meritocracy, art, and joy through computers.
i highly recommend this book to everyone that wants to know the beginnings of our technology-driven society, whether you are technical minded or not. don't be discouraged by the talk of machines you may never have heard of or programming languages and hardware terms you're not familiar with -- these are important to the story, no doubt, but levy explains everything clearly from where the term 'hackers' orignated to why IBM 'hulking giants' were so disdained to what chip does what. and the main story being told is not in the machinery itself, but in the people.
the book reads like fiction. from the middle school genius kids who were openly accepted into the MIT hackers groups, to the cocky 19-year-old named bill gates who refused to share his code openly the way everyone else was doing with each other at the time, and to the 20-something millionaires of the gaming revolution in the 1980s, levy shows us what was happening but also gives us insight into what made these people who they were.
levy has done his research. with facts from extensive interviews, re-interviews, newspaper articles and other resources, he's managed to put together not just a story about the birth and 'growing up' of personal computing, but also show us the human spirit of these geniuses and artists. if you are at all interested in 'hacking' (whether computer-based or otherwise) this book will doubtless inspire you to spend sleepless nights working on your creations knowing that amazing things can happen when you put your mind to it.
as a woman, i'm only sorry that there weren't more women hackers to admire and look up to among all the men, but then, that's not a flaw of the book so much as a sad truth of history.
this book may be out of print, but it is not outdated, and well worth searching through a few used bookstores to find a copy. borrow mine if you must :)
Used price: $0.64
Collectible price: $2.12
Buy one from zShops for: $2.00
Even though I knew how the book was going to end, I actually found myself applauding Holly as she began to discover her strengths and pull away from Ira and resolutely decide to remove herself from his life. What if she had been able to do that? How wonderful (for everyone) if that had happened . . . but Ira would not let anyone leave him. He considered Holly to be his possession, and was not about to let anyone get away from him so easily. It amazes me that he was able to escape detection for so long, and that his friends and acquaintances actually trusted and believed his stories . . . even after Holly's body was found. How does one explain that? A body is found in your apartment and you expect everyone to believe you had nothing to do with it? That there was a conspiracy against Ira Einhorn? Get real! Ira was a nobody -- no one would waste their time conspiring against him. The book was fascinating and frightening at the same time. Much better than the TV movie about the case (which, I admit, sparked my interest and convinced me to buy this book). I recommend it to anyone who is at all intrigued by the case, or anyone who is a fan of the true-crime genre. It is a page-turner, a tale that will sicken and sadden you all at once. Unfortunately, it is a story without a resolution, since Einhorn is still in France and has not been brought to justice -- and that will make you seethe with anger.
List price: $14.00 (that's 20% off!)
Used price: $5.97
Collectible price: $22.00
Buy one from zShops for: $8.40
First, some of the key players "on the outside" are not mentioned; this may well be because most of those who aren't mentioned by now are "insiders." But this results in some of this book being a bit misleading. For example, serious work on cryptanalysis by outsiders, including one piece of work that Admiral Inman, when head of NSA, described as "the most brilliant piece of civilian cryptanalysis since World War II", was already going on by the late 1970s; this had serious national security implications, and helps to explain why NSA was so ambivalent about "outsiders" engaging in *any* crypto research. Overall, although NSA goofed badly several times, I think they managed to keep a more balanced view on the issue than I might have expected. The fact that Levy doesn't mention some of the key "outsider" work suggests to me that he may not have talked with (or at least didn't gain the confidence of) such people as Cipher Deavours and David Kahn, who could have given him perspective on the "outsider" work that he doesn't discuss.
Secondly, I infer that he was unable to get any of the NSA side of the story from NSA itself. This is a pity. It's presumably not Levy's fault; NSA only talks to people it decides to talk to, and then says only what it decides needs to be said. I assume that Levy tried to get information from NSA and failed; I don't know. But if NSA stonewalled Levy, it's because he didn't make the right contacts to get in touch with somebody who would have been willing to talk with him about NSA's viewpoint on various issues Levy discusses that are not sensitive in NSA's view. That extra information would have helped make Levy's book clearer and more complete. In spite of this, Levy is quite fair to NSA, which speaks well of his thoughtfulness and balance.
So, overall I regard this as a good book, well worth reading, provided one keeps in mind that it's not the complete story.
It focus on the story of the people who opened the crypto Pandora's box, allowing todays e-business long before the word was even invented. It starts with Whit Diffie (Diffie-Hellman) in the late 60's, through Rivest, Shamir and Adleman (RSA) and ends with Zimmerman (Pgp) and Helsingius (remailer). It also follows other conributors to crypto and business people (eg. : from RSA, Lotus) as well as some politicians and people involved at the NSA.
The author describes the oppositions between the pro-crypto-for-everyone and the US government, the government self-contradictions and oppositions with the tech firms. This includes facts about the NSA, the Clipper Chip issue, the patents problems, etc. These are always seen from the viewpoint of the different people who where involved at that time.
It is easy to read and does not need any technical or maths background. If focuses on the people. It does not discuss the subject : it tells us the story.
If you are looking for a book about crypto in order to understand "how it works", forget this book. If you want to understand how people with one obsession can change the world, just read it.
The author manages suspens very well, from the beginning to the end. This book is hard to close : you really want to get to the next page.
So why not 5 stars ? Because I think this book could have been perfect with just a few diagrams showing the crypto algorithm (eg. : differences between Diffie-Hellman and RSA are not clear). Ok... ok... I give 5 stars only to books which change my life. This one is exciting, informative and well written, but not to that point.
List price: $13.95 (that's 20% off!)
Used price: $5.95
Collectible price: $14.85
Buy one from zShops for: $8.75
Although the Macintosh debuted in 1984, the seeds of its design had been planted as early as 1945. In a post-war statement, Vannevar Bush, then the director of the U.S. Office of Scientific Research and Development, wrote an essay in which he contended that the next step of technology should be the way we collect and process information. Having seen the early use of computers in the war, Bush realized the awesome potential of high-speed information management, but also knew that progress would have to be made in the interface if ever information management could be useful. Levy follows the chain that links Bush to Alan Kay, who proposed the Dynabook, a forerunner of today's PDA technology, to the developers at Xerox's Palo Alto Research Center who developed the first graphical user interface (GUI). Nearby, a small team of dedicated programmers were working on the low-cost hardware that became teamed with the new GUI concept that became the Macintosh.
Much has been written about the originality of the GUI concept, and more than one lawsuit has been fought over it. Levy attempts to go beyond the simple desktop metaphor and explain why it was the particular Macintosh implementation of the concept that changed the way people viewed computers. Xerox's researchers were quite happy just to discover "how" to do things; it was Jef Raskin, Steve Jobs, Bill Atkinson, Andy Hertzfield, and the rest of the Macintosh team that were driven to give GUI to the people. The concept alone didn't change the world of computing--it was the concept, in a reasonably priced computer, with a "killer application" that showed just how intuitive the concept could be that made things happen. Early Macintosh adoptees like myself thought it was the "What You See is What You Get" word processing and graphic programs that would make everyone see the light. It took Aldus' PageMaker to break the publishing barrier for the "rest of us" to wake up to the possibilities.
The Macintosh implementation had (and has) its problems, which Levy does not gloss over. The initial Macintosh, that computer that I bought in 1984, was released underpowered (128k RAM), without enough storage space (it only had a single floppy drive capable of holding 400k), and crippled in expandability (it was a "closed" system without expansion slots). Apple knew this upon its release, but "real programmers ship," as Jobs is quoted saying, and the Macintosh had to be out the door in 1984. Apple quickly followed the 128k Macintosh with an upgrade to 512k and a 800k disk drive, then with new models including a Macintosh with slots.
The author, Steven Levy, is perhaps best known in the field for his first book, Hackers: Heroes of the Computer Revolution. Levy's position as an industry journalist kept him in the midst of the impact of the Macintosh, with access to Jobs, John Sculley, Jean Louis Gasse, Bill Gates, Aldus' president Paul Brainerd, and almost every member of the Macintosh development team. This chronicle of the development of the Macintosh is part history, part evaluation of the hits and misses, the politics and relationships, of all these people. Every implementation of the GUI interface as seen in the Macintosh was deeply argued, as was its cost, hardware, and "look." Levy shows you that a product such as Macintosh, which is usually attributed to a few people, is actually the culmination of the development team, and also their forerunners, including the Xerox team, and their competitors, most notably Microsoft and IBM.
Today, the GUI concept is ever present. My original Macintosh (which I fondly call the MacAntique), after being upgraded once, has been passed to my niece and nephew (who, to be entirely truthful, play more with their father's Mac II than with the antique), and I replaced it four years ago with an IBM-PC clone that runs today's most popular GUI, Microsoft Windows (the defection was a result of economics--I couldn't afford a new Macintosh). The last command-line holdout, UNIX, is battering down the hatches in defense against the migration of the GUI in the form of the WWW, Java, and its ilk. The Macintosh revolution is twelve, and shows no signs of dying anytime soon. For those who want to understand the early shots--computerdom's equivalent's of the Boston Tea Party and the shot that was heard round the world--Levy's book is a good primer.
The book is not an academic treatise. There are no lengthy footnotes, and no theoretical discussions about what the securities laws might be or should be. Rather, the book answers real-world questions in a straightforward manner, gives contextual background, provides illustrative examples, and points you to the most relevant primary sources if further information is required.
There are 12 chapters:
1. Introduction to securities regulation (including a section on EDGAR)
2. Periodic reporting under Sections 13(a) and 15(d)
3. Reporting of beneficial ownership under Sections 13(d) and 13(g)
4. Insider reporting under Section 16(a)
5. Short-swing trading and exemptions under Section 16(b)
6. Tender offer disclosure requirements
7. Proxy solicitations under Section 14(a)
8. Securities fraud under Rule 10b-5
9. Use of electronic media
10. Selling restricted and control securities under Rule 144
11. Private resales to institutional investors under Rule 144A
12. Going private transactions under Rule 13e-3.
This is a good book to consider for any corporate governance library.