This fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From phreaking to deepfakes, and from APT to zombie malware, grasping the terminology is crucial to understanding hacker culture and history.
This fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From phreaking to deepfakes, and from APT to zombie malware, grasping the terminology is crucial to understanding hacker culture and history.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Kim Crawley has been a cybersecurity researcher and writer for well over a decade. She authored 8 Steps to Better Security, and co-authored The Pentester Blueprint, both with strongly positive reviews on Amazon and Goodreads. She was also featured in the first volume of Marcus J. Carey and Jennifer Jin's Tribe of Hackers. Her magazine articles and blogs have appeared in 2600 Magazine, CIO Magazine, Sophos Naked Security, AT&T Cybersecurity's blog, Infosecurity Magazine, Hack The Box, and too many other places to name here. Recently, she has given talks about penetration testing and hacker culture at SANS PenTest HackFest and Wild West Hackin' Fest. In her spare time, Kim enjoys playing JRPG video games, listening to goth, progressive, jazz, and funk music, cuddling her teddy bears, watching anime, astrology, being a pedantic know-it-all, looking at Lake Ontario from her condo in Toronto, and spending time with her metalhead partner, Jay.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497