Cantitate/Preț
Produs

Hackers and Hacking: A Reference Handbook: Contemporary World Issues

Autor Thomas J. Holt, Bernadette H. Schell
en Limba Engleză Hardback – 18 iul 2013 – vârsta până la 17 ani
This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact.What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day.Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraud-acts that can have devastating effects upon our modern information society.
Citește tot Restrânge

Din seria Contemporary World Issues

Preț: 19629 lei

Preț vechi: 51753 lei
-62% Nou

Puncte Express: 294

Preț estimativ în valută:
3756 38100$ 3132£

Carte tipărită la comandă

Livrare economică 24 martie-07 aprilie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9781610692762
ISBN-10: 1610692764
Pagini: 376
Ilustrații: 12 bw illus
Dimensiuni: 152 x 229 x 33 mm
Greutate: 0.68 kg
Ediția:New.
Editura: Bloomsbury Publishing
Colecția ABC-CLIO
Seria Contemporary World Issues

Locul publicării:New York, United States

Caracteristici

Describes the subculture of computer hackers and explains how this social world plays an integral role in the business of hacking

Notă biografică

Thomas J. Holt, PhD, is associate professor in the School of Criminal Justice at Michigan State University. His published work includes Crime On-Line: Correlates, Causes, and Context and Digital Crime and Digital Terrorism, Second Edition.Bernadette H. Schell, PhD, is vice-provost at Laurentian University in Barrie, Ontario, Canada. She was formerly Founding Dean of Business and Information Technology at the University of Ontario Institute of Technology. Her published work includes The Hacking of America: Who's Doing It, Why, and How and Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications.

Cuprins

List of Figures and TablesPreface1 Background and HistoryThe Growth and Adoption of the Internet from 1969 through the PresentInternet DefinedGaining Authorized Access to the Internet and the Modes of CommunicationEmailListservInternet Relay ChatTelnetSocial Networking WebsitesRemote RetrievalA Closer Look at the Adoption of the Internet in Developed NationsA Closer Look at the Adoption of the Internet in Developing NationsAssessing the Present-Day Internet Economy on a Global ScaleGetting Unauthorized Network Access by Black Hat Hacking or CrackingHacker and Cracker DefinedClassifying Hackers by IntentionsClassifying Hackers by SkillClassifying Hackers as Insiders or OutsidersA Cautionary Note on Hacker Classification Schemes and Overgeneralizing about HackersVarious Types of Hacker Exploits Causing Harm and the Harm InflictedHacking Exploits in the Use of Deception and Theft of Property or DataHacking Exploits Used in CyberviolenceThe Key Elements of Criminal Liability, Conventional Crimes, and HackingConventional Crimes and the Four Key Elements of Criminal LiabilityHacking and the Four Key Elements of Criminal LiabilityHacker Predispositions: What the Literature Tells UsHackers: Known Traits of InsidersHackers: Known Traits of Outsider/External AttackersConclusionReferences2 Problems, Controversies, and SolutionsFundamentals of Hack Attacks and Patches as a CountermeasureThe Basics of Hack AttacksPatches: An Organizational Countermeasure for Hack AttacksThe Evolving Structure of the Internet: The Good News and the BadThe Good News: A New and Exciting Information EraThe Bad News: The Evolution of the Internet Creates a New Playing Field for Network AttackersA Further Look at the Purpose and Function of FirewallsThe Pros and Cons of Moving to "the Cloud,"Network Hacks: Recent Surveys on the Frequency and the Types of Harm Caused15th Annual Computer Crime and Security Survey (2010/2011)Respondent SampleKey Study FindingsConcluding Remarks2011 TELUS-Rotman Joint Study on Canadian IT Security PracticesRespondent SampleKey Study FindingsLaws Created to Keep Abreast of the Evolving InternetHealth Insurance Portability and Accountability Act of 1996U.S. State Data Breach Notification LawSarbanes-Oxley ActPayment Card Industry Data Security StandardIntellectual Property Rights and Copyright InfringementInternational Privacy and Security LawsPrivacy LawsSecurity Laws in the United StatesSecurity Laws in Other JurisdictionsFederal Information Security Management ActGramm-Leach-Bliley ActHealth Information Technology for Economic and Clinical Health ActPayment Card Industry Payment Application StandardThe Militarization of CyberspaceIndustry "Best Practices" for Preventing Hack Attacks and Recovering from ThemProtection StrategiesFor HacktivismFor MalwareFor Drive-by Downloads and BlackholesFor Software VulnerabilitiesFor USB Drives and Other Mobile Devices Such as TabletsFor Cloud "Insecurity,"For Social NetworksThe Need for Security Policies and Security Policy Checklists in Businesses and Government AgenciesThe Importance of Intrusion Prevention, Intrusion Detection, and Intrusion RecoveryIntrusion Prevention Is ImportantIntrusion Detection Is ImportantIntrusion Recovery Is ImportantHow Well Enterprises Are Coping with Network Prevention, Intrusions, and RecoveryCrystal Ball Gazing: What Might the Future Bring?ConclusionReferences3 PerspectivesProtecting Critical Infrastructures (Bob Radvanosky)Examining Social Dynamics and Malware Secrets to Mitigate Net-centric Attacks (Ziming Zhao and G.-J. Ahn)The Role of Nation-States in Cyberattacks (Max Kilger)The Case for Strong Data Breach Notification Legislation (Douglas E. Salane)Data Breach Noti?cation LegislationThe Need for Strong, Broad-Based Consumer ProtectionsData Breach CostsWhy Attempts at Federal Legislation Fall ShortConcluding RemarksA Criminologist's Perspective on the Implications of Criminological Research for Policies and Practices Aimed at Addressing Hacking and Malware Infection (Adam M. Bossler)Implications for Parental and School PracticesPolicy Implications for Law EnforcementHacking and Criminality (Nathan Fisk)The Life Cycle of a Botnet (Aditya K. Sood and Richard J. Enbody)Taking the Fun out of Playtime: Real Crime and Video Games (Rob D'Ovidio, Murugan Anandarajan, and Alex Jenkins)Looking at Crime in Video Games through the Lens of Routine Activities Theory4 Profiles5 Data and DocumentsAnti-Phishing Working Group: Phishing Activity Trends Report, Second Quarter 2012The Malware Domain ListPonemon Institute Study: 2011 Cost of Data Breach Study: United StatesSymantec: Internet Security Threat Report 2011A Closer Look at Corporate and Governmental Data Theft on a Global Basis: The 2012 Verizon Data Breach Investigations ReportThe On-Land and Online Real-World ContextThe Report's Main FindingsReport ConclusionsReferences6 ResourcesPrint: BooksPrint: Magazines, White Papers, News, and Downloadable ArticlesNonprint: Hacking WebsitesNonprint: Hacking-Related Films and Learn How-to-Hack VideosNonprint: Websites of Companies Offering Antivirus SoftwareNonprint: Websites of Companies Offering FirewallsNonprint: Websites of Companies Offering Intrusion-Detection SystemsNonprint: U.S. Government Agencies and Independent Organizations Fighting Malicious Hacking7 ChronologyPrehistory (1800s-1969)1815 to Mid-1800s1920s-1950sThe Elder Days (1970-1979)The Golden Age (1980-1989)The Great Hacker Wars and Hacker Activism (1990-2000)Fear of a Cyber-Apocalypse Era (2001-Present)GlossaryAbout the AuthorsIndex

Recenzii

Hackers and Hacking is a good reference work for novices and enthusiasts who want to gain a better understanding of today's technology-infused world.
This unique addition to the Contemporary World Issues series enables the nontechie to better comprehend this worldwide issue of cybercrime. . . . A worthwhile addition to the reference collections of high school, academic, and public libraries.
"This text is well written and timely. Individuals will find the book's organization and layout to be user-friendly. This text will complement a variety of libraries, including personal and professional libraries.'