How do you write a truly gripping thriller about people staring into computer screens? Many have tried, none have succeeded—until now. Leave it to Deaver, the. The Blue Nowhere by Jeffery Deaver – Jeffery Deaver, New York Times bestselling author of The Skin Collector and The Bone Collector featuring popular. The Blue Nowhere is a cyber thriller set in the time of the Internet bubble of the s. Jeffery Deaver is an accomplished novelist who knows.
|Published (Last):||7 February 2008|
|PDF File Size:||5.87 Mb|
|ePub File Size:||17.28 Mb|
|Price:||Free* [*Free Regsitration Required]|
While I know there were liberties with the tech, I believe good storytelling needs creative liberties to entertain, as well as to educate on possibilities.
IBM announces the first affordable home computer for the masses. Dec 31, Asghar Abbas rated it really liked it. There was a problem filtering reviews right now. Is every gifted “hacker type” unable to keep fr I was on a Jeffery Deaver kick a few years ago and being unable to find an unread Lincoln Rhyme novel one of which later ended my obsessive reading of Mr.
The basic plot of The Blue Nowhere is a computerised version of the Eddie Murphy film 48 Hours; a hacker is let out of prison to help the LAPD Computer Crimes Unit track down another hacker, who has the screen name Phate, who has turned serial killer. Lara looked toward it quickly, alarmed. However still this book is good for people who are interested in computer, hacking, and the internet because in my opinion, someone who is not much knowledgeable in the area might find a hard time following the story and picturing what are the characters especially Gilette are doing.
Reading it now, 10 years later, is undoubtedly a different experience. Ships from and sold by Amazon. Deaver has written another winning tale that will send him to the top of the hard copy best-selling charts.
I enjoy almost all of Deaver’s characters and his interesting plot twists.
No, it’s not about zombies. The Blue Nowhere is a really good cyber thriller that gets the technical details right.
To Phate, each murder is like a big, challenging computer hack: Kindle Edition Verified Purchase. What results is a hacker-on-hacker blitzkrieg where hackers try to one-up each other in a series of social engineering and hacking operations. A mysterious, psychotic, and brilliant computer hacker, code-named Phate, is infiltrating their computer, invading their lives, and—with the perfect line, the perfect, personal detail—luring them to their deaths.
The review of this Book prepared by Jenny J.
The writing is straight forward, not complex, and should be acceptable to a wide audience.
Apparently I am part of a very small contingent that needs te details to actually be correct. Click on a plot link to find similar books! An equally brilliant computer hacker and former role playing partner, “Valleyman”, one Wyatt Gillette is recruited by the police to help capture Phate in a contest of wits and guile. When I started Terebrate back in JanuaryI always intended it to be a place to put my book reviews on whatever I was reading.
Add to Cart Add to Cart.
The Blue Nowhere by Jeffery Deaver
San Francisco Chronicle Deaver packs The Blue Nowhere with enough twists and surprises that even the most alert reader will be gulled nowehre the numerous red herrings and narrative decoys Wyatt Gillette, a convicted hacker serving time in prison, is called upon to help the police catch a hacker that gets into jffery computers, finds out everything he can about them, and then lures them close enough to him that he can stab them in the heart with his big knife.
Open Jeffrey See a Problem? Try the Kindle edition and experience these great reading features: The bureaucracy springs Gillette from prison and he becomes our main character with an entourage of police officers leading him in the contest against his rival hacker. Cryptocurrency, Blockchain and Bitcoin: Other than this the book is readable and will probably be enjoyed by both “computer people” though by now it’s badly dated and “point and clickers” deavee me alike.
To put the information into IP packets, given control of a router, would not be particularly difficult. Nor was it across the street in the Apple Computer lot or the one next to it, belonging to Sun Microsystems.
Follow the Author
I’m labeling this under spoiler just in case. A predictable group including cops and hackers are in pursuit of a killer using social engineering to get close If you have cyber intelligence needs, you should bblue calling those guys. Sign up and get a free bllue Gillette, Bishop, the unsympathetic Shelton and a team of computer specialists go on a manhunt for the serial killer Phate, with the dual mission of preventing further murders and eventually apprehending the killer.
He even manages to accurately depict the relationship between the hacking and gaming cultures that was prominent during the decade.