JEFFERY DEAVER BLUE NOWHERE PDF

How do you write a truly gripping thriller about people staring into computer screens? Many have tried, none have succeeded—until now. Leave it to Deaver, the. The Blue Nowhere by Jeffery Deaver – Jeffery Deaver, New York Times bestselling author of The Skin Collector and The Bone Collector featuring popular. Blue Nowhere by Jeffery Deaver – Jeffery Deaver, bestselling author of The Empty Chair and The Bone Collector, now turns to the labyrinthine world of.

Author: Zulurisar Yozshusar
Country: Germany
Language: English (Spanish)
Genre: Technology
Published (Last): 14 July 2008
Pages: 347
PDF File Size: 6.3 Mb
ePub File Size: 20.5 Mb
ISBN: 644-5-48292-601-2
Downloads: 51462
Price: Free* [*Free Regsitration Required]
Uploader: Zulukasa

You can learn all day long with this particular book. Denn obwohl die Beschreibung nach einem Superheld klingt, ist Gillette das ganz und gar nicht. Dec 31, Asghar Abbas rated it really liked it. And if anybody’s wondering where the title Blue Nowhere comes into play, it supposedly represents online space.

He is not normally associated with technical thrillers, but he turned his writing skills in this book to a manhunt-type story where the serial killer in question is also a world-class hacker. There’s an unnecessary subplot about Wyatt trying to get back his estranged ex-wife that goes nowhere. Simon and Schuster- Fiction – pages.

A predictable group including cops and hackers are in pursuit of a killer using social engineering to get close The Blue Nowhere is a good cyber thriller that gets the technical details right.

Phate sees the world as a global computer game searching for difficult targets to kill. The one part of the plot which seems unlikely, if not impossible, is the program used by Phate to target the victims, which is named Trapdoor.

In fact, I found myself desperately turning the pages, so sucked in that I was willing to finish this story in a single sitting. Being written in is not an excuse for blatantly over the top technical blunders. When a sadistic hacker, code-named Phate, sets his sights on Silicon Valley, his victims never know what hit them.

Phate has cracked one of the major Internet routers, and uses a steganographic and the proof reader of the novel should note the spelling of the word method to infect the target machine, sending small sections of the Trapdoor program in individual IP packets which are part of the normal online communication.

  GRAND GRIMOIRE OF INFERNAL PACTS PDF

The Blue Nowhere is about a psychotic computer hacker who goes by the name of Phate, who hacks into people’s computer databases, invading their personal lives, posing as another being and leading his victims to their deaths.

Kathryn Dance Book 1.

Mar 25, Corey rated it really liked it Shelves: A reasonable story and therefore read. Based on a reference from a friend who knew of our lengthy career in real computer mainframes, we were afraid the computer terminology might be at the 4th grade mowhere or else totally fictional and unreal.

The Unfinished Novel and Other stories.

Like nearly all the young men here for happy hour they were in casual slacks and tie-less dress shirts and wore the ubiquitous insignia of Silicon Valley—corporate identification badges on thin canvas lanyards around their necks. The style, by the way, is similar to Michael Connelly. Virtually every character is now a cliche. Desperate, the blie of The California State Police Computer Crimes Division frees Wyatt Gillette, imprisoned for hacking, to aid the investigation — against the loud protests of the rest of the division.

Gillette and the police go through a pulse quenching race to stop Phate from killing, and there are so many twists and turns in the plot with a lightning pace, that reading the book is like being on a roller coaster!

The Blue Nowhere – Jeffery Deaver – Google Books

To ask other readers questions about The Blue Nowhereplease sign up. The mad hacker, meanwhile, no longer able to discern between the virtual and the real, has adapted a notorious online role-playing game to the world of flesh and blood, with innocent humans as his prey. You could usually count on the fact that if a hacker had any skill at all, he or she also spent some significant time crawling through multi-user dungeons MUDswhich are text-based adventure games that are the precursor to the World of Warcraft-styled games we see today.

The ” nowhere” represents online space, that world of electrons that hackers and unline freaks lose themselves in. LAPD temporarily frees Wyatt so that he can help them catch the killing hacker. That would be a nice trick if a hacker figured out how to do it. By accessing linked computers he is able to ” engineer” his identity changing grades, occupation, references, ownership, etc. I have read 3 and working on another one. This veaver your first – and last – mistake. The story has his usual twists and turns and surprises but certainly seems a bit over-populated in places a a few too many red herrings and what se Came across this in a pile of “take one, leave one” books in a local store and was surprised I had not read it devaer since I enjoy Jeffery’s work.

  BLAST VORTICISM PDF

This one had my mind spinning. The reasons that systems are vulnerable to cracking are generally attributable to human carelessness, such things as users writing down passwords or using obvious words, or bugs in software which can be exploited.

The Blue Nowhere

Of course, if you never go online, you would have nothing to worry about. Deaver can spin nowhdre tale like no other! This is a good story, a “page tuner” as they say and my major objections to fall in a couple of “small” areas. The review of this Book prepared by Harriet Klausner.

I think the biggest issue I had with this one was in relation to the explanations. Unable to match the killer’s skills, authorities recruit another programmer, convicted hacker, Wyatt Gillette to track down the killer, along with an Internet industry specialist, Patricia Nolan, who has motives of her own.

The Blue Nowhere by Jeffery Deaver

To Phate, each murder is like a big, challenging computer hack: Apr 21, John Blair rated it did not like it. The identity of this ally, Shawn, comes as a complete and very satisfying surprise. By clicking ‘Sign me up’ I acknowledge that I have read and agree to the privacy policy nowwhere terms of use. The police know that the only way catch Phate is to play him at his own game.