How do you write a truly gripping thriller about people staring into computer screens? Many have tried, none have succeeded—until now. Leave it to Deaver, the. The Blue Nowhere by Jeffery Deaver – Jeffery Deaver, New York Times bestselling author of The Skin Collector and The Bone Collector featuring popular. The Blue Nowhere is a cyber thriller set in the time of the Internet bubble of the s. Jeffery Deaver is an accomplished novelist who knows.
|Published (Last):||18 May 2009|
|PDF File Size:||8.72 Mb|
|ePub File Size:||17.26 Mb|
|Price:||Free* [*Free Regsitration Required]|
San Francisco Chronicle A gripping high-tech page turner. That is not to say this book was perfect, but it was a really enjoyable read.
It had the feel that it was designed for a movie or television special as opposed to a memorable novel. The only issue I had trouble with, and a minor issue, the law enforcement departments were too willing to do shallow background checks on people and data, especially when engaged in life and death scenarios.
Phate leans that his old cyber crony searches for him turning this into a hacker’s duel to the death.
Book Review – Jeffery Deaver’s The Blue Nowhere | The intangible world of the literary mind
Deaver’s work I was forced to get something else from the library. Real lives are stored in the Blue Nowhere. I realized that 10 years ago, the background tutorials would have been fascinating and probably would have carried the reader along, ooooh-ing and ahhh-ing all the way at the wonders of technology to come. I think the biggest issue I had with this one nowhdre in relation to the explanations.
Follow the Author
As good as the book w A great edge-of-your-seat cyberspace thriller by Deaver! His trim but long blond hair and the goatee had stuck in her mind. I put this square on the shelf with other novels about hackers that do not exaggerate the craft.
Get a FREE e-book by joining our mailing list today! The novel was written using an anonymous narrator and character dialog interspersed throughout the composition. I would recommend it and rate it “Pleasurable not-memorable”. Discover Prime Book Box for Veaver. Oct 06, Mike the Paladin rated it really liked it. He’s a computer hacking genius. By Rick Howard July 14, He starts off the book in prison for hacking into the Department of Defence computers and allegedly running a piece of software that could This was the first book by this author that I have read after a work colleague recommended it to me about 2 years ago.
Gillette, Bishop, the unsympathetic Shelton and a team of computer specialists go on a manhunt for the serial killer Phate, with the dual mission of preventing further nowhete and eventually apprehending the killer. It is interesting to compare this to other more recent cyber thrillers written by cyber experts who are writing their first novels, such as Richard A. However, it seems unlikely that a crime novelist could develop that attack blueprint without talking to somebody who is at least thinking about how it might be done.
He starts off the book in prison for hacking into the Department of Defence computers and allegedly running a piece of software that could encrypt their ‘unbreakable’ Standard 12 software.
I work in IT and it scared me a lot! Little does our convicted felon know, our hacker killer has his eyes set deaer him to be the next victim. IBM announces the first affordable home computer for the masses. Theres no excuse for it either. Gillette also a computer programmer, jailed for cracking a top military incription program, and a once confederate of Phate in the virtual game he is now playing for real.
Sometimes the only way to stop a monster is to kill it. Withoutabox Submit to Film Festivals. A Novel on your Kindle in under a minute. See more by Jeffery Deaver. Oh, you can take your hand out of your purse.
Detailed Review Summary of The Blue Nowhere by Jeffery Deaver
Comunque sia lo consiglio caldamente. Sorry, your blog cannot share posts by email. It also has the added benefit of being written by an accomplished novelist who knows a thing or two about plot, character development, and pace.
You won’t learn how to break into the Pentagon. During the 80s and 90s, many of the same people who nwhere involved in the hacking community were also involved in the gaming community.
Since then, a lot has happened in my professional life. Deavet squadrons represented here were Compaq, Hewlett-Packard and Apple, not to mention a slew of new kids on the block, start-up Internet companies, which were held in some jefrery by the venerable Valley regulars. There he learns intimate details about his intended victim and ultimately murders them. To Phate, each murder is like a big, challenging computer hack: It was just paranoia, she told herself.