- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact. What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques,…mehr
Andere Kunden interessierten sich auch für
- David PutrinoHacking Health25,99 €
- David PutrinoHacking Health25,99 €
- Monir SadikiCyber Security durch KI22,90 €
- Michael BüblTajna wiedza zawodu slusarza21,50 €
- Turning Points-Actual and Alternate Histories103,99 €
- Turning Points--Actual and Alternate Histories103,99 €
- Chinese Religions in Contemporary Societies103,99 €
-
-
-
This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact. What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day. Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraud-acts that can have devastating effects upon our modern information society.
Produktdetails
- Produktdetails
- Verlag: ABC-CLIO
- Seitenzahl: 376
- Erscheinungstermin: 19. Juli 2013
- Englisch
- Abmessung: 235mm x 157mm x 25mm
- Gewicht: 696g
- ISBN-13: 9781610692762
- ISBN-10: 1610692764
- Artikelnr.: 36912527
- Verlag: ABC-CLIO
- Seitenzahl: 376
- Erscheinungstermin: 19. Juli 2013
- Englisch
- Abmessung: 235mm x 157mm x 25mm
- Gewicht: 696g
- ISBN-13: 9781610692762
- ISBN-10: 1610692764
- Artikelnr.: 36912527
Thomas J. Holt, PhD, is associate professor in the School of Criminal Justice at Michigan State University. His published work includes Crime On-Line: Correlates, Causes, and Context and Digital Crime and Digital Terrorism, Second Edition. Bernadette H. Schell, PhD, is vice-provost at Laurentian University in Barrie, Ontario, Canada. She was formerly Founding Dean of Business and Information Technology at the University of Ontario Institute of Technology. Her published work includes The Hacking of America: Who's Doing It, Why, and How and Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications.
List of Figures and Tables Preface 1 Background and History The Growth and
Adoption of the Internet from 1969 through the Present Internet Defined
Gaining Authorized Access to the Internet and the Modes of Communication
Email Listserv Internet Relay Chat Telnet Social Networking Websites Remote
Retrieval A Closer Look at the Adoption of the Internet in Developed
Nations A Closer Look at the Adoption of the Internet in Developing Nations
Assessing the Present-Day Internet Economy on a Global Scale Getting
Unauthorized Network Access by Black Hat Hacking or Cracking Hacker and
Cracker Defined Classifying Hackers by Intentions Classifying Hackers by
Skill Classifying Hackers as Insiders or Outsiders A Cautionary Note on
Hacker Classification Schemes and Overgeneralizing about Hackers Various
Types of Hacker Exploits Causing Harm and the Harm Inflicted Hacking
Exploits in the Use of Deception and Theft of Property or Data Hacking
Exploits Used in Cyberviolence The Key Elements of Criminal Liability,
Conventional Crimes, and Hacking Conventional Crimes and the Four Key
Elements of Criminal Liability Hacking and the Four Key Elements of
Criminal Liability Hacker Predispositions: What the Literature Tells Us
Hackers: Known Traits of Insiders Hackers: Known Traits of
Outsider/External Attackers Conclusion References 2 Problems,
Controversies, and Solutions Fundamentals of Hack Attacks and Patches as a
Countermeasure The Basics of Hack Attacks Patches: An Organizational
Countermeasure for Hack Attacks The Evolving Structure of the Internet: The
Good News and the Bad The Good News: A New and Exciting Information Era The
Bad News: The Evolution of the Internet Creates a New Playing Field for
Network Attackers A Further Look at the Purpose and Function of Firewalls
The Pros and Cons of Moving to "the Cloud," Network Hacks: Recent Surveys
on the Frequency and the Types of Harm Caused 15th Annual Computer Crime
and Security Survey (2010/2011) Respondent Sample Key Study Findings
Concluding Remarks 2011 TELUS-Rotman Joint Study on Canadian IT Security
Practices Respondent Sample Key Study Findings Laws Created to Keep Abreast
of the Evolving Internet Health Insurance Portability and Accountability
Act of 1996 U.S. State Data Breach Notification Law Sarbanes-Oxley Act
Payment Card Industry Data Security Standard Intellectual Property Rights
and Copyright Infringement International Privacy and Security Laws Privacy
Laws Security Laws in the United States Security Laws in Other
Jurisdictions Federal Information Security Management Act
Gramm-Leach-Bliley Act Health Information Technology for Economic and
Clinical Health Act Payment Card Industry Payment Application Standard The
Militarization of Cyberspace Industry "Best Practices" for Preventing Hack
Attacks and Recovering from Them Protection Strategies For Hacktivism For
Malware For Drive-by Downloads and Blackholes For Software Vulnerabilities
For USB Drives and Other Mobile Devices Such as Tablets For Cloud
"Insecurity," For Social Networks The Need for Security Policies and
Security Policy Checklists in Businesses and Government Agencies The
Importance of Intrusion Prevention, Intrusion Detection, and Intrusion
Recovery Intrusion Prevention Is Important Intrusion Detection Is Important
Intrusion Recovery Is Important How Well Enterprises Are Coping with
Network Prevention, Intrusions, and Recovery Crystal Ball Gazing: What
Might the Future Bring? Conclusion References 3 Perspectives Protecting
Critical Infrastructures (Bob Radvanosky) Examining Social Dynamics and
Malware Secrets to Mitigate Net-centric Attacks (Ziming Zhao and G.-J. Ahn)
The Role of Nation-States in Cyberattacks (Max Kilger) The Case for Strong
Data Breach Notification Legislation (Douglas E. Salane) Data Breach
Noti?cation Legislation The Need for Strong, Broad-Based Consumer
Protections Data Breach Costs Why Attempts at Federal Legislation Fall
Short Concluding Remarks A Criminologist's Perspective on the Implications
of Criminological Research for Policies and Practices Aimed at Addressing
Hacking and Malware Infection (Adam M. Bossler) Implications for Parental
and School Practices Policy Implications for Law Enforcement Hacking and
Criminality (Nathan Fisk) The Life Cycle of a Botnet (Aditya K. Sood and
Richard J. Enbody) Taking the Fun out of Playtime: Real Crime and Video
Games (Rob D'Ovidio, Murugan Anandarajan, and Alex Jenkins) Looking at
Crime in Video Games through the Lens of Routine Activities Theory 4
Profiles 5 Data and Documents Anti-Phishing Working Group: Phishing
Activity Trends Report, Second Quarter 2012 The Malware Domain List Ponemon
Institute Study: 2011 Cost of Data Breach Study: United States Symantec:
Internet Security Threat Report 2011 A Closer Look at Corporate and
Governmental Data Theft on a Global Basis: The 2012 Verizon Data Breach
Investigations Report The On-Land and Online Real-World Context The
Report's Main Findings Report Conclusions References 6 Resources Print:
Books Print: Magazines, White Papers, News, and Downloadable Articles
Nonprint: Hacking Websites Nonprint: Hacking-Related Films and Learn
How-to-Hack Videos Nonprint: Websites of Companies Offering Antivirus
Software Nonprint: Websites of Companies Offering Firewalls Nonprint:
Websites of Companies Offering Intrusion-Detection Systems Nonprint: U.S.
Government Agencies and Independent Organizations Fighting Malicious
Hacking 7 Chronology Prehistory (1800s-1969) 1815 to Mid-1800s 1920s-1950s
The Elder Days (1970-1979) The Golden Age (1980-1989) The Great Hacker Wars
and Hacker Activism (1990-2000) Fear of a Cyber-Apocalypse Era
(2001-Present) Glossary About the Authors Index
Adoption of the Internet from 1969 through the Present Internet Defined
Gaining Authorized Access to the Internet and the Modes of Communication
Email Listserv Internet Relay Chat Telnet Social Networking Websites Remote
Retrieval A Closer Look at the Adoption of the Internet in Developed
Nations A Closer Look at the Adoption of the Internet in Developing Nations
Assessing the Present-Day Internet Economy on a Global Scale Getting
Unauthorized Network Access by Black Hat Hacking or Cracking Hacker and
Cracker Defined Classifying Hackers by Intentions Classifying Hackers by
Skill Classifying Hackers as Insiders or Outsiders A Cautionary Note on
Hacker Classification Schemes and Overgeneralizing about Hackers Various
Types of Hacker Exploits Causing Harm and the Harm Inflicted Hacking
Exploits in the Use of Deception and Theft of Property or Data Hacking
Exploits Used in Cyberviolence The Key Elements of Criminal Liability,
Conventional Crimes, and Hacking Conventional Crimes and the Four Key
Elements of Criminal Liability Hacking and the Four Key Elements of
Criminal Liability Hacker Predispositions: What the Literature Tells Us
Hackers: Known Traits of Insiders Hackers: Known Traits of
Outsider/External Attackers Conclusion References 2 Problems,
Controversies, and Solutions Fundamentals of Hack Attacks and Patches as a
Countermeasure The Basics of Hack Attacks Patches: An Organizational
Countermeasure for Hack Attacks The Evolving Structure of the Internet: The
Good News and the Bad The Good News: A New and Exciting Information Era The
Bad News: The Evolution of the Internet Creates a New Playing Field for
Network Attackers A Further Look at the Purpose and Function of Firewalls
The Pros and Cons of Moving to "the Cloud," Network Hacks: Recent Surveys
on the Frequency and the Types of Harm Caused 15th Annual Computer Crime
and Security Survey (2010/2011) Respondent Sample Key Study Findings
Concluding Remarks 2011 TELUS-Rotman Joint Study on Canadian IT Security
Practices Respondent Sample Key Study Findings Laws Created to Keep Abreast
of the Evolving Internet Health Insurance Portability and Accountability
Act of 1996 U.S. State Data Breach Notification Law Sarbanes-Oxley Act
Payment Card Industry Data Security Standard Intellectual Property Rights
and Copyright Infringement International Privacy and Security Laws Privacy
Laws Security Laws in the United States Security Laws in Other
Jurisdictions Federal Information Security Management Act
Gramm-Leach-Bliley Act Health Information Technology for Economic and
Clinical Health Act Payment Card Industry Payment Application Standard The
Militarization of Cyberspace Industry "Best Practices" for Preventing Hack
Attacks and Recovering from Them Protection Strategies For Hacktivism For
Malware For Drive-by Downloads and Blackholes For Software Vulnerabilities
For USB Drives and Other Mobile Devices Such as Tablets For Cloud
"Insecurity," For Social Networks The Need for Security Policies and
Security Policy Checklists in Businesses and Government Agencies The
Importance of Intrusion Prevention, Intrusion Detection, and Intrusion
Recovery Intrusion Prevention Is Important Intrusion Detection Is Important
Intrusion Recovery Is Important How Well Enterprises Are Coping with
Network Prevention, Intrusions, and Recovery Crystal Ball Gazing: What
Might the Future Bring? Conclusion References 3 Perspectives Protecting
Critical Infrastructures (Bob Radvanosky) Examining Social Dynamics and
Malware Secrets to Mitigate Net-centric Attacks (Ziming Zhao and G.-J. Ahn)
The Role of Nation-States in Cyberattacks (Max Kilger) The Case for Strong
Data Breach Notification Legislation (Douglas E. Salane) Data Breach
Noti?cation Legislation The Need for Strong, Broad-Based Consumer
Protections Data Breach Costs Why Attempts at Federal Legislation Fall
Short Concluding Remarks A Criminologist's Perspective on the Implications
of Criminological Research for Policies and Practices Aimed at Addressing
Hacking and Malware Infection (Adam M. Bossler) Implications for Parental
and School Practices Policy Implications for Law Enforcement Hacking and
Criminality (Nathan Fisk) The Life Cycle of a Botnet (Aditya K. Sood and
Richard J. Enbody) Taking the Fun out of Playtime: Real Crime and Video
Games (Rob D'Ovidio, Murugan Anandarajan, and Alex Jenkins) Looking at
Crime in Video Games through the Lens of Routine Activities Theory 4
Profiles 5 Data and Documents Anti-Phishing Working Group: Phishing
Activity Trends Report, Second Quarter 2012 The Malware Domain List Ponemon
Institute Study: 2011 Cost of Data Breach Study: United States Symantec:
Internet Security Threat Report 2011 A Closer Look at Corporate and
Governmental Data Theft on a Global Basis: The 2012 Verizon Data Breach
Investigations Report The On-Land and Online Real-World Context The
Report's Main Findings Report Conclusions References 6 Resources Print:
Books Print: Magazines, White Papers, News, and Downloadable Articles
Nonprint: Hacking Websites Nonprint: Hacking-Related Films and Learn
How-to-Hack Videos Nonprint: Websites of Companies Offering Antivirus
Software Nonprint: Websites of Companies Offering Firewalls Nonprint:
Websites of Companies Offering Intrusion-Detection Systems Nonprint: U.S.
Government Agencies and Independent Organizations Fighting Malicious
Hacking 7 Chronology Prehistory (1800s-1969) 1815 to Mid-1800s 1920s-1950s
The Elder Days (1970-1979) The Golden Age (1980-1989) The Great Hacker Wars
and Hacker Activism (1990-2000) Fear of a Cyber-Apocalypse Era
(2001-Present) Glossary About the Authors Index
List of Figures and Tables Preface 1 Background and History The Growth and
Adoption of the Internet from 1969 through the Present Internet Defined
Gaining Authorized Access to the Internet and the Modes of Communication
Email Listserv Internet Relay Chat Telnet Social Networking Websites Remote
Retrieval A Closer Look at the Adoption of the Internet in Developed
Nations A Closer Look at the Adoption of the Internet in Developing Nations
Assessing the Present-Day Internet Economy on a Global Scale Getting
Unauthorized Network Access by Black Hat Hacking or Cracking Hacker and
Cracker Defined Classifying Hackers by Intentions Classifying Hackers by
Skill Classifying Hackers as Insiders or Outsiders A Cautionary Note on
Hacker Classification Schemes and Overgeneralizing about Hackers Various
Types of Hacker Exploits Causing Harm and the Harm Inflicted Hacking
Exploits in the Use of Deception and Theft of Property or Data Hacking
Exploits Used in Cyberviolence The Key Elements of Criminal Liability,
Conventional Crimes, and Hacking Conventional Crimes and the Four Key
Elements of Criminal Liability Hacking and the Four Key Elements of
Criminal Liability Hacker Predispositions: What the Literature Tells Us
Hackers: Known Traits of Insiders Hackers: Known Traits of
Outsider/External Attackers Conclusion References 2 Problems,
Controversies, and Solutions Fundamentals of Hack Attacks and Patches as a
Countermeasure The Basics of Hack Attacks Patches: An Organizational
Countermeasure for Hack Attacks The Evolving Structure of the Internet: The
Good News and the Bad The Good News: A New and Exciting Information Era The
Bad News: The Evolution of the Internet Creates a New Playing Field for
Network Attackers A Further Look at the Purpose and Function of Firewalls
The Pros and Cons of Moving to "the Cloud," Network Hacks: Recent Surveys
on the Frequency and the Types of Harm Caused 15th Annual Computer Crime
and Security Survey (2010/2011) Respondent Sample Key Study Findings
Concluding Remarks 2011 TELUS-Rotman Joint Study on Canadian IT Security
Practices Respondent Sample Key Study Findings Laws Created to Keep Abreast
of the Evolving Internet Health Insurance Portability and Accountability
Act of 1996 U.S. State Data Breach Notification Law Sarbanes-Oxley Act
Payment Card Industry Data Security Standard Intellectual Property Rights
and Copyright Infringement International Privacy and Security Laws Privacy
Laws Security Laws in the United States Security Laws in Other
Jurisdictions Federal Information Security Management Act
Gramm-Leach-Bliley Act Health Information Technology for Economic and
Clinical Health Act Payment Card Industry Payment Application Standard The
Militarization of Cyberspace Industry "Best Practices" for Preventing Hack
Attacks and Recovering from Them Protection Strategies For Hacktivism For
Malware For Drive-by Downloads and Blackholes For Software Vulnerabilities
For USB Drives and Other Mobile Devices Such as Tablets For Cloud
"Insecurity," For Social Networks The Need for Security Policies and
Security Policy Checklists in Businesses and Government Agencies The
Importance of Intrusion Prevention, Intrusion Detection, and Intrusion
Recovery Intrusion Prevention Is Important Intrusion Detection Is Important
Intrusion Recovery Is Important How Well Enterprises Are Coping with
Network Prevention, Intrusions, and Recovery Crystal Ball Gazing: What
Might the Future Bring? Conclusion References 3 Perspectives Protecting
Critical Infrastructures (Bob Radvanosky) Examining Social Dynamics and
Malware Secrets to Mitigate Net-centric Attacks (Ziming Zhao and G.-J. Ahn)
The Role of Nation-States in Cyberattacks (Max Kilger) The Case for Strong
Data Breach Notification Legislation (Douglas E. Salane) Data Breach
Noti?cation Legislation The Need for Strong, Broad-Based Consumer
Protections Data Breach Costs Why Attempts at Federal Legislation Fall
Short Concluding Remarks A Criminologist's Perspective on the Implications
of Criminological Research for Policies and Practices Aimed at Addressing
Hacking and Malware Infection (Adam M. Bossler) Implications for Parental
and School Practices Policy Implications for Law Enforcement Hacking and
Criminality (Nathan Fisk) The Life Cycle of a Botnet (Aditya K. Sood and
Richard J. Enbody) Taking the Fun out of Playtime: Real Crime and Video
Games (Rob D'Ovidio, Murugan Anandarajan, and Alex Jenkins) Looking at
Crime in Video Games through the Lens of Routine Activities Theory 4
Profiles 5 Data and Documents Anti-Phishing Working Group: Phishing
Activity Trends Report, Second Quarter 2012 The Malware Domain List Ponemon
Institute Study: 2011 Cost of Data Breach Study: United States Symantec:
Internet Security Threat Report 2011 A Closer Look at Corporate and
Governmental Data Theft on a Global Basis: The 2012 Verizon Data Breach
Investigations Report The On-Land and Online Real-World Context The
Report's Main Findings Report Conclusions References 6 Resources Print:
Books Print: Magazines, White Papers, News, and Downloadable Articles
Nonprint: Hacking Websites Nonprint: Hacking-Related Films and Learn
How-to-Hack Videos Nonprint: Websites of Companies Offering Antivirus
Software Nonprint: Websites of Companies Offering Firewalls Nonprint:
Websites of Companies Offering Intrusion-Detection Systems Nonprint: U.S.
Government Agencies and Independent Organizations Fighting Malicious
Hacking 7 Chronology Prehistory (1800s-1969) 1815 to Mid-1800s 1920s-1950s
The Elder Days (1970-1979) The Golden Age (1980-1989) The Great Hacker Wars
and Hacker Activism (1990-2000) Fear of a Cyber-Apocalypse Era
(2001-Present) Glossary About the Authors Index
Adoption of the Internet from 1969 through the Present Internet Defined
Gaining Authorized Access to the Internet and the Modes of Communication
Email Listserv Internet Relay Chat Telnet Social Networking Websites Remote
Retrieval A Closer Look at the Adoption of the Internet in Developed
Nations A Closer Look at the Adoption of the Internet in Developing Nations
Assessing the Present-Day Internet Economy on a Global Scale Getting
Unauthorized Network Access by Black Hat Hacking or Cracking Hacker and
Cracker Defined Classifying Hackers by Intentions Classifying Hackers by
Skill Classifying Hackers as Insiders or Outsiders A Cautionary Note on
Hacker Classification Schemes and Overgeneralizing about Hackers Various
Types of Hacker Exploits Causing Harm and the Harm Inflicted Hacking
Exploits in the Use of Deception and Theft of Property or Data Hacking
Exploits Used in Cyberviolence The Key Elements of Criminal Liability,
Conventional Crimes, and Hacking Conventional Crimes and the Four Key
Elements of Criminal Liability Hacking and the Four Key Elements of
Criminal Liability Hacker Predispositions: What the Literature Tells Us
Hackers: Known Traits of Insiders Hackers: Known Traits of
Outsider/External Attackers Conclusion References 2 Problems,
Controversies, and Solutions Fundamentals of Hack Attacks and Patches as a
Countermeasure The Basics of Hack Attacks Patches: An Organizational
Countermeasure for Hack Attacks The Evolving Structure of the Internet: The
Good News and the Bad The Good News: A New and Exciting Information Era The
Bad News: The Evolution of the Internet Creates a New Playing Field for
Network Attackers A Further Look at the Purpose and Function of Firewalls
The Pros and Cons of Moving to "the Cloud," Network Hacks: Recent Surveys
on the Frequency and the Types of Harm Caused 15th Annual Computer Crime
and Security Survey (2010/2011) Respondent Sample Key Study Findings
Concluding Remarks 2011 TELUS-Rotman Joint Study on Canadian IT Security
Practices Respondent Sample Key Study Findings Laws Created to Keep Abreast
of the Evolving Internet Health Insurance Portability and Accountability
Act of 1996 U.S. State Data Breach Notification Law Sarbanes-Oxley Act
Payment Card Industry Data Security Standard Intellectual Property Rights
and Copyright Infringement International Privacy and Security Laws Privacy
Laws Security Laws in the United States Security Laws in Other
Jurisdictions Federal Information Security Management Act
Gramm-Leach-Bliley Act Health Information Technology for Economic and
Clinical Health Act Payment Card Industry Payment Application Standard The
Militarization of Cyberspace Industry "Best Practices" for Preventing Hack
Attacks and Recovering from Them Protection Strategies For Hacktivism For
Malware For Drive-by Downloads and Blackholes For Software Vulnerabilities
For USB Drives and Other Mobile Devices Such as Tablets For Cloud
"Insecurity," For Social Networks The Need for Security Policies and
Security Policy Checklists in Businesses and Government Agencies The
Importance of Intrusion Prevention, Intrusion Detection, and Intrusion
Recovery Intrusion Prevention Is Important Intrusion Detection Is Important
Intrusion Recovery Is Important How Well Enterprises Are Coping with
Network Prevention, Intrusions, and Recovery Crystal Ball Gazing: What
Might the Future Bring? Conclusion References 3 Perspectives Protecting
Critical Infrastructures (Bob Radvanosky) Examining Social Dynamics and
Malware Secrets to Mitigate Net-centric Attacks (Ziming Zhao and G.-J. Ahn)
The Role of Nation-States in Cyberattacks (Max Kilger) The Case for Strong
Data Breach Notification Legislation (Douglas E. Salane) Data Breach
Noti?cation Legislation The Need for Strong, Broad-Based Consumer
Protections Data Breach Costs Why Attempts at Federal Legislation Fall
Short Concluding Remarks A Criminologist's Perspective on the Implications
of Criminological Research for Policies and Practices Aimed at Addressing
Hacking and Malware Infection (Adam M. Bossler) Implications for Parental
and School Practices Policy Implications for Law Enforcement Hacking and
Criminality (Nathan Fisk) The Life Cycle of a Botnet (Aditya K. Sood and
Richard J. Enbody) Taking the Fun out of Playtime: Real Crime and Video
Games (Rob D'Ovidio, Murugan Anandarajan, and Alex Jenkins) Looking at
Crime in Video Games through the Lens of Routine Activities Theory 4
Profiles 5 Data and Documents Anti-Phishing Working Group: Phishing
Activity Trends Report, Second Quarter 2012 The Malware Domain List Ponemon
Institute Study: 2011 Cost of Data Breach Study: United States Symantec:
Internet Security Threat Report 2011 A Closer Look at Corporate and
Governmental Data Theft on a Global Basis: The 2012 Verizon Data Breach
Investigations Report The On-Land and Online Real-World Context The
Report's Main Findings Report Conclusions References 6 Resources Print:
Books Print: Magazines, White Papers, News, and Downloadable Articles
Nonprint: Hacking Websites Nonprint: Hacking-Related Films and Learn
How-to-Hack Videos Nonprint: Websites of Companies Offering Antivirus
Software Nonprint: Websites of Companies Offering Firewalls Nonprint:
Websites of Companies Offering Intrusion-Detection Systems Nonprint: U.S.
Government Agencies and Independent Organizations Fighting Malicious
Hacking 7 Chronology Prehistory (1800s-1969) 1815 to Mid-1800s 1920s-1950s
The Elder Days (1970-1979) The Golden Age (1980-1989) The Great Hacker Wars
and Hacker Activism (1990-2000) Fear of a Cyber-Apocalypse Era
(2001-Present) Glossary About the Authors Index