HomeGroupsTalkZeitgeist
Hide this

Results from Google Books

Click on a thumbnail to go to Google Books.

The Blue Nowhere by Jeffery Deaver
Loading...

The Blue Nowhere (original 2001; edition 2002)

by Jeffery Deaver (Author)

MembersReviewsPopularityAverage ratingMentions
1,434295,244 (3.76)11
Member:losloper
Title:The Blue Nowhere
Authors:Jeffery Deaver (Author)
Info:Pocket Books (2002), Editie: Reprint,
Collections:Your library
Rating:
Tags:Roman, Crime, Engels

Work details

The Blue Nowhere by Jeffery Deaver (2001)

Recently added byPJ817, Catsplus, PhxDan, private library, reluctantsnowman, knersus, H.B.Oberman.Library, cecca
None
Loading...

Sign up for LibraryThing to find out whether you'll like this book.

No current Talk conversations about this book.

» See also 11 mentions

English (25)  Italian (1)  German (1)  Spanish (1)  Dutch (1)  All languages (29)
Showing 1-5 of 25 (next | show all)
Very outdated, even just a few years after publication. I guess author/editor thought they needed to extremely dumb down and explain computer terminology that is (and was even at the time of publication) fairly well understood (or can be easily discovered without so much heavy handed coddeling in the text). ( )
  john_hunter | Dec 13, 2013 |
The " nowhere" represents online space, that world of electrons that hackers and unline freaks lose themselves in. It' a nifty metaphor and Deaver handles the technical details of this novel very well — at least as far as I could tell. A brilliant programmer, a cracker (someone who breaks into another computer to do damage as opposed to a hacker who just breaks in to poke around for the thrill of beating the system) is killing people and the Computer Crimes Unit relaizes they are in way over their heads. They enlist the help of Wyatt Earp — oops, Wyatt Gillette — another brilliant hacker currently in jail for having broken in to some defense department computers — to help them find Phate. Phate (there are many spelling related puns) was a former associate of Wyatt' who has so confused reality with a computer game he was playing that he has mixed up the real killing with that of the computer game. By accessing linked computers he is able to " engineer" his identity (changing grades, occupation, references, ownership, etc.,) and track down an ever-increasing set of targets, giving himself additional points as the difficulty inceases. Of course, if you' paranoid, this book will really get you going, because Phate has created a program called Trapdoor that permits him to enter your computer and collect all the information stored therein and then use that data to his own nefarious purposes. Of course, if you never go online, you would have nothing to worry about. Throughout the story, Phate has an ally, one who keeps revealing the police plans and actions so Phate can stay one step ahead of the authorities. The identity of this ally, Shawn, comes as a complete and very satisfying surprise. Good story. ( )
  ecw0647 | Sep 30, 2013 |
The powerful new thriller from the author of THE DEVIL'S TEARDROP and THE EMPTY CHAIR. In Jeff's most chilling and topical thriller to date, we meet the most powerful and modern of criminals, the uber-hacker. Trawling both on and off the Net, he can follow your every move, your every detail and your every communication. He can invade your life before taking it away from you. This is the novel that will stop you ever turning your computer on again. Ranged against this modern day mastermind are two new heros. Frank Bishop, a streetwise but very human cop, and his unwilling ally, Wyatt Gillette, a young, brilliant and idealistic hacker who found himself in prison, but now has been liberated to fight this incipient disaster.
  Hans.Michel | Sep 13, 2013 |
i have always found fiction about computer security very hard to enjoy ('net force' and 'digital fortress' come to mind). i guess being in the industry myself, i find them more annoying than entertaining (an experience that may be similar to a history major sitting down to watch pearl harbor??).

i had high hopes at the beginning of this book. in spite of myself, i found the early chapters actually sound credible - tech-wise...but as the story went on, the inaccuracies in all the techno-babble quickly made them sound like poor attempts at geek-ery. although i realize, of course, that all the hacking and computer security stuff was nothing more than a plot devise, it still kind of ruined the experience for me.

having said that, i have never enjoyed a novel based on it security as much as i have this one :) ( )
  riida | Mar 2, 2013 |
good! ( )
  jenny.whitman | Apr 8, 2012 |
Showing 1-5 of 25 (next | show all)
no reviews | add a review
You must log in to edit Common Knowledge data.
For more help see the Common Knowledge help page.
Series (with order)
Canonical title
Original title
Alternative titles
Original publication date
People/Characters
Important places
Important events
Related movies
Awards and honors
Epigraph
When I say that the brain is a machine, it is meant not as an insult to the mind but as an acknowledgment of the potential of a machine. I do not believe that a human mind is less than what we imagine it to be, but rather that a machine can be much, much more.
--W. Daniel Hillis, The Pattern on the Stone
Dedication
First words
The battered white van had made her uneasy.
Quotations
Information from the Dutch Common Knowledge. Edit to localize it to the English one.
Wanneer ik zeg dat het brein een machine is, is dat niet bedoeld als belediging van de geest maar als een erkenning van de capaciteiten van een machine. Ik geloof niet dat het menselijk brein minder is dan we denken dat het is, maar eerder dat een machine meer, veel meer kan zijn. (W. Daniel Hillis, The Pattern on the stone)
Last words
(Click to show. Warning: May contain spoilers.)
Disambiguation notice
ISBN 0276425936 is for the Reader's Digest condensed [abridged] version of the book.

Publisher's editors
Blurbers
Publisher series
Original language

References to this work on external resources.

Wikipedia in English

None

Book description
Haiku summary

Amazon.com Amazon.com Review (ISBN 0671042262, Mass Market Paperback)

In this 21st century version of the "Gunfight at the O.K. Corral," two computer wizards engage in the kind of high-tech combat that only a hacker could love. Wyatt Gillette, a cybergenius who's never used his phenomenal talent for evil, is sitting in a California jail doing time for a few harmless computer capers when he gets a temporary reprieve--a chance to help the Computer Crimes Unit of the state police nail a cracker (a criminally inclined hacker) called Phate who's using his ingenious program, Trapdoor, to lure innocent victims to their death by infiltrating their computers. Gillette and Phate were once the kings of cyberspace--the Blue Nowhere of the title--but Phate has gone way past the mischievous electronic pranks they once pulled and crossed over to the dark side. While Trapdoor can hack its way into any computer, it's Phate's skill at "social engineering" as well as his remarkable coding ability that makes him such a menace to society. As Wyatt explains to the policeman who springs him from prison so that he can find and stop Phate before he kills again, "It means conning somebody, pretending you're someone you're not. Hackers do it to get access to data bases and phone lines and pass codes. The more facts about somebody you can feed back to them, the more they believe you and the more they'll do what you want them to."

Bestselling author Jeffery Deaver (The Empty Chair, The Devil's Teardrop) ratchets up the suspense one line of code at a time; his terrific pacing drives the narrative to a thrilling and explosive conclusion. This thriller is bound to induce paranoia in anyone who still believes he can hide his deepest secrets from anyone with the means, motive, and modem to ferret them out. --Jane Adams

(retrieved from Amazon Mon, 30 Sep 2013 13:56:23 -0400)

(see all 4 descriptions)

His code name is Phate -- a sadistic hacker who infiltrates people's computers, invades their lives, and with chilling precision lures them to their deaths. To stop him, the authorities free imprisoned former hacker Wyatt Gillette to aid the investigation. Teamed with old-school homicide detective Frank Bishop. Gillette must combine their disparate talents to catch a brilliant and merciless killer.… (more)

(summary from another edition)

» see all 4 descriptions

Quick Links

Swap Ebooks Audio
572 avail.
14 wanted
4 pay5 pay

Popular covers

Rating

Average: (3.76)
0.5
1 2
1.5 4
2 13
2.5 5
3 83
3.5 20
4 91
4.5 11
5 67

Audible.com

Two editions of this book were published by Audible.com.

See editions

Is this you?

Become a LibraryThing Author.

 

Help/FAQs | About | Privacy/Terms | Blog | Contact | LibraryThing.com | APIs | WikiThing | Common Knowledge | Legacy Libraries | Early Reviewers | 92,151,526 books! | Top bar: Always visible