Wednesday, April 8, 2015

Review: The Quantum Deception

Quantum Deception blog tourAbout the book:
What starts out as a calm night in Salt Lake City turns into chaos when a passenger plane crashes into the mountains. When reformed cyber hacker Tanner Stone links the accident to an ingenious Chinese computer virus, it’s up to him to prevent it from destroying the financial data of everyone in America! Thrilling, explosive, and packed with twists, this book changes everything you know about Internet security.

About the author:
Few people understand the terrifying, yet realistic threat of computer hacking like Denver Acey. Denver has spent his entire professional career in the information technology industry where he has witnessed and even thwarted actual cybercrime. From his top-secret job working for the US government to securing computer networks at Fortune 500 companies, Denver is personally familiar with hackers and their unscrupulous activities.
But over the years, Denver has become increasingly frustrated with Hollywood’s inaccurate portrayal of cybercrime. Hackers are more intelligent and more sophisticated than simple teenagers, who guzzle down Mountain Dew while playing video games. Cybercrime is a billion-dollar business that encompasses organized crime and foreign governments. For these elite hackers, the fruits of success are iconic trademarks, innovative patents, and government secrets.
Because of his unique background, Denver decided to write a book to dispel hacking myths while highlighting the tenacity of cybercriminals. Utilizing actual computer hacking concepts and scenarios that he has experienced firsthand, Denver illustrates — in a simple way for even the non-techie to understand — how vulnerable we all are to cybercrime.

FROM REIDHEAD RANDOMNESS (guest post from Mr. Randomness):

Now I have to go back and read quantum breach, the first book in the two book series.  This was a fun read.  Quantum deception is based in the same area that I live.  Now I'll never be able to look at the NSA data complex the same.  I'll always be wondering what capabilities they REALLY have for identifying terrorist threats.  As a fan of internet security and any and all technology, this was a fairly fast read with enough factual information to make it seem reasonably plausible.  The target audience for this book would probably be adults with an interest in cyber security.


Post a Comment

If you can't leave a comment, try using another browser. Sorry for the inconvenience! Sometimes firefox won't work.