Home > Computing and Information Technology > Computer security > Computer fraud and hacking > Hackers and Hacking: A Reference Handbook(Contemporary World Issues)
8%
Hackers and Hacking: A Reference Handbook(Contemporary World Issues)

Hackers and Hacking: A Reference Handbook(Contemporary World Issues)

          
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact. What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day. Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraud—acts that can have devastating effects upon our modern information society.

Table of Contents:
List of Figures and Tables Preface 1 Background and History The Growth and Adoption of the Internet from 1969 through the Present Internet Defined Gaining Authorized Access to the Internet and the Modes of Communication Email Listserv Internet Relay Chat Telnet Social Networking Websites Remote Retrieval A Closer Look at the Adoption of the Internet in Developed Nations A Closer Look at the Adoption of the Internet in Developing Nations Assessing the Present-Day Internet Economy on a Global Scale Getting Unauthorized Network Access by Black Hat Hacking or Cracking Hacker and Cracker Defined Classifying Hackers by Intentions Classifying Hackers by Skill Classifying Hackers as Insiders or Outsiders A Cautionary Note on Hacker Classification Schemes and Overgeneralizing about Hackers Various Types of Hacker Exploits Causing Harm and the Harm Inflicted Hacking Exploits in the Use of Deception and Theft of Property or Data Hacking Exploits Used in Cyberviolence The Key Elements of Criminal Liability, Conventional Crimes, and Hacking Conventional Crimes and the Four Key Elements of Criminal Liability Hacking and the Four Key Elements of Criminal Liability Hacker Predispositions: What the Literature Tells Us Hackers: Known Traits of Insiders Hackers: Known Traits of Outsider/External Attackers Conclusion References 2 Problems, Controversies, and Solutions Fundamentals of Hack Attacks and Patches as a Countermeasure The Basics of Hack Attacks Patches: An Organizational Countermeasure for Hack Attacks The Evolving Structure of the Internet: The Good News and the Bad The Good News: A New and Exciting Information Era The Bad News: The Evolution of the Internet Creates a New Playing Field for Network Attackers A Further Look at the Purpose and Function of Firewalls The Pros and Cons of Moving to "the Cloud," Network Hacks: Recent Surveys on the Frequency and the Types of Harm Caused 15th Annual Computer Crime and Security Survey (2010/2011) Respondent Sample Key Study Findings Concluding Remarks 2011 TELUS-Rotman Joint Study on Canadian IT Security Practices Respondent Sample Key Study Findings Laws Created to Keep Abreast of the Evolving Internet Health Insurance Portability and Accountability Act of 1996 U.S. State Data Breach Notification Law Sarbanes-Oxley Act Payment Card Industry Data Security Standard Intellectual Property Rights and Copyright Infringement International Privacy and Security Laws Privacy Laws Security Laws in the United States Security Laws in Other Jurisdictions Federal Information Security Management Act Gramm-Leach-Bliley Act Health Information Technology for Economic and Clinical Health Act Payment Card Industry Payment Application Standard The Militarization of Cyberspace Industry "Best Practices" for Preventing Hack Attacks and Recovering from Them Protection Strategies For Hacktivism For Malware For Drive-by Downloads and Blackholes For Software Vulnerabilities For USB Drives and Other Mobile Devices Such as Tablets For Cloud "Insecurity," For Social Networks The Need for Security Policies and Security Policy Checklists in Businesses and Government Agencies The Importance of Intrusion Prevention, Intrusion Detection, and Intrusion Recovery Intrusion Prevention Is Important Intrusion Detection Is Important Intrusion Recovery Is Important How Well Enterprises Are Coping with Network Prevention, Intrusions, and Recovery Crystal Ball Gazing: What Might the Future Bring? Conclusion References 3 Perspectives Protecting Critical Infrastructures (Bob Radvanosky) Examining Social Dynamics and Malware Secrets to Mitigate Net-centric Attacks (Ziming Zhao and G.-J. Ahn) The Role of Nation-States in Cyberattacks (Max Kilger) The Case for Strong Data Breach Notification Legislation (Douglas E. Salane) Data Breach Noti?cation Legislation The Need for Strong, Broad-Based Consumer Protections Data Breach Costs Why Attempts at Federal Legislation Fall Short Concluding Remarks A Criminologist's Perspective on the Implications of Criminological Research for Policies and Practices Aimed at Addressing Hacking and Malware Infection (Adam M. Bossler) Implications for Parental and School Practices Policy Implications for Law Enforcement Hacking and Criminality (Nathan Fisk) The Life Cycle of a Botnet (Aditya K. Sood and Richard J. Enbody) Taking the Fun out of Playtime: Real Crime and Video Games (Rob D'Ovidio, Murugan Anandarajan, and Alex Jenkins) Looking at Crime in Video Games through the Lens of Routine Activities Theory 4 Profiles 5 Data and Documents Anti-Phishing Working Group: Phishing Activity Trends Report, Second Quarter 2012 The Malware Domain List Ponemon Institute Study: 2011 Cost of Data Breach Study: United States Symantec: Internet Security Threat Report 2011 A Closer Look at Corporate and Governmental Data Theft on a Global Basis: The 2012 Verizon Data Breach Investigations Report The On-Land and Online Real-World Context The Report's Main Findings Report Conclusions References 6 Resources Print: Books Print: Magazines, White Papers, News, and Downloadable Articles Nonprint: Hacking Websites Nonprint: Hacking-Related Films and Learn How-to-Hack Videos Nonprint: Websites of Companies Offering Antivirus Software Nonprint: Websites of Companies Offering Firewalls Nonprint: Websites of Companies Offering Intrusion-Detection Systems Nonprint: U.S. Government Agencies and Independent Organizations Fighting Malicious Hacking 7 Chronology Prehistory (1800s–1969) 1815 to Mid-1800s 1920s–1950s The Elder Days (1970–1979) The Golden Age (1980–1989) The Great Hacker Wars and Hacker Activism (1990–2000) Fear of a Cyber-Apocalypse Era (2001–Present) Glossary About the Authors Index


Best Sellers


Product Details
  • ISBN-13: 9781610692762
  • Publisher: Bloomsbury Publishing PLC
  • Publisher Imprint: Abc-Clio
  • Depth: 32
  • Language: English
  • Returnable: Y
  • Spine Width: 33 mm
  • Weight: 720 gr
  • ISBN-10: 1610692764
  • Publisher Date: 19 Jul 2013
  • Binding: Hardback
  • Height: 229 mm
  • No of Pages: 376
  • Series Title: Contemporary World Issues
  • Sub Title: A Reference Handbook
  • Width: 152 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Hackers and Hacking: A Reference Handbook(Contemporary World Issues)
Bloomsbury Publishing PLC -
Hackers and Hacking: A Reference Handbook(Contemporary World Issues)
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Hackers and Hacking: A Reference Handbook(Contemporary World Issues)

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA