HomeGroupsTalkZeitgeist
Hide this

Results from Google Books

Click on a thumbnail to go to Google Books.

The Blue Nowhere by Jeffery Deaver
Loading...

The Blue Nowhere (original 2001; edition 2002)

by Jeffery Deaver

MembersReviewsPopularityAverage ratingMentions
1,477315,039 (3.77)11
Member:losloper
Title:The Blue Nowhere
Authors:Jeffery Deaver (Author)
Info:Pocket Books (2002), Editie: Reprint,
Collections:Your library
Rating:
Tags:Roman, Crime, Engels

Work details

The Blue Nowhere by Jeffery Deaver (2001)

None
Loading...

Sign up for LibraryThing to find out whether you'll like this book.

No current Talk conversations about this book.

» See also 11 mentions

English (27)  Italian (1)  German (1)  Spanish (1)  Dutch (1)  All languages (31)
Showing 1-5 of 27 (next | show all)
The heart of the story - a bad guy with a penchant for penetrating security, especially computer information security, to meet people face-to-face and murder them, and the cops and convicted hacker trying to catch the bad guy - is reasonably interesting.

The language and the writing is AWFUL. I read this book on the recommendation of a friend, and had to check the copyright date to make sure that I wasn't being unfair. I wasn't. By 2001 the Internet and the World Wide Web were settled and accepted names, but Deaver had to be clever and invent a reason that everyone in his novel would actually call it "The Blue Nowhere", or failing that "The Machine World". Verifiable facts are wrong.

And then Deaver makes up ridiculous stuff left and right about computer nerds/hackers left and right, most of it for no particularly good reason. For example, the good-guy and the bad-guy hackers type so hard and violently that every one of their finger tips is callused, and this is a common hacker affliction. Yep, thumbs too. Because they invented a new way of typing using their thumbs more to type faster. I've NEVER heard of anyone with one callused finger tip like that, let alone all 10.

Also, the good-guy regularly hits keys on his keyboard so hard that he jams them, unplugs the keyboard and plugs in a new one so he can keep going. And I'm typing on a keyboard of that era. If a key jams (it happens) it is MUCH faster to smack the keyboard and knock it loose than to REPLACE THE KEYBOARD. What does all of this fallacious crap do to further the story - ooooh. these guys are REALLY BAD ASS NERDS. They break keyboards. They type so hard they have calluses. oooooooh. Yep. That absolutely defines hyper computer nerd for me. Oh, and the good-guy hacker did finger-tip push-ups while he was in prison to keep up his finger strength for typing when he got out.

Basically, the writing style is so horribly bad that it kept yanking me out of the story and making me mad at the author. If I ever meet Jeffery Deaver I will have to resist the urge to slap him, because he probably goes to a gym regularly and will kick my nerdy butt, which is why he doesn't actually know anything about computers or the internet, or anyone he could have asked to get it right. ( )
  grizzly.anderson | Apr 30, 2015 |
Written in 2001, a time when the general public was becoming very aware of what computers could do but did not understand how. In this thriller we find the hero to be a computer hacker who is totally immersed in that electronic world, the "Blue Nowhere", and we discover thatr our worst fears coud be realized by way of his keyboarding expertise. Wyatt Gillette had made one bad mistake in his life and was in prison paying for it. His expertise with computers and the software that runs them, makes him invaluable to the police investigating a murder that had been perpetrated by someone who knew all about the victim, information that could only have been stolen from computers that had all her information stored on them.

the plot has lots of twists and turns and provides interesting and fascinating insights into the hackers world. While computers have become more accessible to more people than ever before, the structure of this novel remains as valid today as when it was written - there is danger in The Blue Nowhere. ( )
  WhitmelB | Mar 8, 2015 |
Very outdated, even just a few years after publication. I guess author/editor thought they needed to extremely dumb down and explain computer terminology that is (and was even at the time of publication) fairly well understood (or can be easily discovered without so much heavy handed coddeling in the text). ( )
1 vote john_hunter | Dec 13, 2013 |
The " nowhere" represents online space, that world of electrons that hackers and unline freaks lose themselves in. It' a nifty metaphor and Deaver handles the technical details of this novel very well — at least as far as I could tell. A brilliant programmer, a cracker (someone who breaks into another computer to do damage as opposed to a hacker who just breaks in to poke around for the thrill of beating the system) is killing people and the Computer Crimes Unit relaizes they are in way over their heads. They enlist the help of Wyatt Earp — oops, Wyatt Gillette — another brilliant hacker currently in jail for having broken in to some defense department computers — to help them find Phate. Phate (there are many spelling related puns) was a former associate of Wyatt' who has so confused reality with a computer game he was playing that he has mixed up the real killing with that of the computer game. By accessing linked computers he is able to " engineer" his identity (changing grades, occupation, references, ownership, etc.,) and track down an ever-increasing set of targets, giving himself additional points as the difficulty inceases. Of course, if you' paranoid, this book will really get you going, because Phate has created a program called Trapdoor that permits him to enter your computer and collect all the information stored therein and then use that data to his own nefarious purposes. Of course, if you never go online, you would have nothing to worry about. Throughout the story, Phate has an ally, one who keeps revealing the police plans and actions so Phate can stay one step ahead of the authorities. The identity of this ally, Shawn, comes as a complete and very satisfying surprise. Good story. ( )
  ecw0647 | Sep 30, 2013 |
The powerful new thriller from the author of THE DEVIL'S TEARDROP and THE EMPTY CHAIR. In Jeff's most chilling and topical thriller to date, we meet the most powerful and modern of criminals, the uber-hacker. Trawling both on and off the Net, he can follow your every move, your every detail and your every communication. He can invade your life before taking it away from you. This is the novel that will stop you ever turning your computer on again. Ranged against this modern day mastermind are two new heros. Frank Bishop, a streetwise but very human cop, and his unwilling ally, Wyatt Gillette, a young, brilliant and idealistic hacker who found himself in prison, but now has been liberated to fight this incipient disaster.
  Hans.Michel | Sep 13, 2013 |
Showing 1-5 of 27 (next | show all)
no reviews | add a review

» Add other authors (13 possible)

Author nameRoleType of authorWork?Status
Jeffery Deaverprimary authorall editionsconfirmed
Curtoni, MatteoTranslatorsecondary authorsome editionsconfirmed
Parolini, MauraTranslatorsecondary authorsome editionsconfirmed
You must log in to edit Common Knowledge data.
For more help see the Common Knowledge help page.
Series (with order)
Canonical title
Original title
Alternative titles
Original publication date
People/Characters
Important places
Important events
Related movies
Awards and honors
Epigraph
When I say that the brain is a machine, it is meant not as an insult to the mind but as an acknowledgment of the potential of a machine. I do not believe that a human mind is less than what we imagine it to be, but rather that a machine can be much, much more.
--W. Daniel Hillis, The Pattern on the Stone
Dedication
First words
The battered white van had made her uneasy.
Quotations
Information from the Dutch Common Knowledge. Edit to localize it to your language.
Wanneer ik zeg dat het brein een machine is, is dat niet bedoeld als belediging van de geest maar als een erkenning van de capaciteiten van een machine. Ik geloof niet dat het menselijk brein minder is dan we denken dat het is, maar eerder dat een machine meer, veel meer kan zijn. (W. Daniel Hillis, The Pattern on the stone)
Last words
(Click to show. Warning: May contain spoilers.)
Disambiguation notice
ISBN 0276425936 is for the Reader's Digest condensed [abridged] version of the book.

Publisher's editors
Blurbers
Publisher series
Original language

References to this work on external resources.

Wikipedia in English

None

Book description
Haiku summary

Amazon.com Amazon.com Review (ISBN 0671042262, Mass Market Paperback)

In this 21st century version of the "Gunfight at the O.K. Corral," two computer wizards engage in the kind of high-tech combat that only a hacker could love. Wyatt Gillette, a cybergenius who's never used his phenomenal talent for evil, is sitting in a California jail doing time for a few harmless computer capers when he gets a temporary reprieve--a chance to help the Computer Crimes Unit of the state police nail a cracker (a criminally inclined hacker) called Phate who's using his ingenious program, Trapdoor, to lure innocent victims to their death by infiltrating their computers. Gillette and Phate were once the kings of cyberspace--the Blue Nowhere of the title--but Phate has gone way past the mischievous electronic pranks they once pulled and crossed over to the dark side. While Trapdoor can hack its way into any computer, it's Phate's skill at "social engineering" as well as his remarkable coding ability that makes him such a menace to society. As Wyatt explains to the policeman who springs him from prison so that he can find and stop Phate before he kills again, "It means conning somebody, pretending you're someone you're not. Hackers do it to get access to data bases and phone lines and pass codes. The more facts about somebody you can feed back to them, the more they believe you and the more they'll do what you want them to."

Bestselling author Jeffery Deaver (The Empty Chair, The Devil's Teardrop) ratchets up the suspense one line of code at a time; his terrific pacing drives the narrative to a thrilling and explosive conclusion. This thriller is bound to induce paranoia in anyone who still believes he can hide his deepest secrets from anyone with the means, motive, and modem to ferret them out. --Jane Adams

(retrieved from Amazon Mon, 30 Sep 2013 13:56:23 -0400)

(see all 4 descriptions)

His code name is Phate -- a sadistic hacker who infiltrates people's computers, invades their lives, and with chilling precision lures them to their deaths. To stop him, the authorities free imprisoned former hacker Wyatt Gillette to aid the investigation. Teamed with old-school homicide detective Frank Bishop. Gillette must combine their disparate talents to catch a brilliant and merciless killer.… (more)

(summary from another edition)

» see all 4 descriptions

Quick Links

Swap Ebooks Audio
572 avail.
14 wanted
4 pay5 pay

Popular covers

Rating

Average: (3.77)
0.5
1 3
1.5 4
2 14
2.5 5
3 83
3.5 20
4 97
4.5 11
5 70

Audible.com

2 editions of this book were published by Audible.com.

See editions

Is this you?

Become a LibraryThing Author.

 

Help/FAQs | About | Privacy/Terms | Blog | Contact | LibraryThing.com | APIs | WikiThing | Common Knowledge | Legacy Libraries | Early Reviewers | 97,174,026 books! | Top bar: Always visible