I picked out Rob Shein's Zero Day Exploit: Countdown to Darkness (Cyber-Fiction) at the library simply because it stuck out as an obvious "computer book" in the fiction section. I thought it had been mis-shelved and so it caught my eye. I finished reading it because ... well, it is simply so bad as to have a kind of Ed Wood "B-movie" allure. It is a pity, because the idea has promise: a fictionalised cyber-security thriller that can almost double as a vulnerability assessment and computer forensics text because of the detail it includes. Unfortunately, the book would be better titled Zero Day FAIL! In terms of the computer security technicalities, it is really light weight, making only cursory reference to just a few of the most routine security issues and tools, and describing a methodology that is far from leading practice. The author's main characters are meant to be save-the-world "white hat" geniuses, but they come across as bumbling script-kiddie amateurs. Stuck debugging a program because they mis-spelt "main"? Forgot there might be a firewall in place? Found a vulnerability on the first attempt by sending a stream of É, "because it is a character know to cause buffer overflows". Sheesh! |
And did I mention the plot? It goes from sublime to the ridiculous, and then just peters away..
Mind you, even well-known authors can fall into the "sublime to the ridiculous" plot trap. Take Eric Van Lustbader for example, writing Robert Ludlum's (TM) The Bourne Sanction. Whereas Ludlum was a true master at pulling together incredibly complex and outlandish plots while never for a moment losing the credulity of his audience, Van Lustbader always seems to miss the mark by a little. And as a reader, once you start questioning the realism of characters' behaviour and the uncanny role of coincidences, then the magic of the story is quickly extinguished and the author has lost you.
I mention The Bourne Sanction for one further reason: like Zero Day Exploit, it features terrorists attempting to distroy the petroleum distribution infrastructure of the US. And the one thing that Rob Shein should feel happy about is that his scenario for how this could be done is way more credible than what Van Lustbader cooked up for The Bourne Sanction (which made me think Van Lustbader was probably script-consulting on Speed 2 at the time)
So was Zero Day Exploit mis-shelved? You bet. They missed the bin by a mile!
0 comments:
Post a Comment