24,95 €
24,95 €
inkl. MwSt.
Sofort per Download lieferbar
24,95 €
24,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
Als Download kaufen
24,95 €
inkl. MwSt.
Sofort per Download lieferbar
Jetzt verschenken
24,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
  • Format: PDF

Hacker culture can be esoteric, but this entertaining reference is here to help. Written by longtime cybersecurity researcher and writer Kim Crawley, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From airgapping to phreaking to zombie malware, grasping the terminology is crucial to understanding hacker culture and history.If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come…mehr

Produktbeschreibung
Hacker culture can be esoteric, but this entertaining reference is here to help. Written by longtime cybersecurity researcher and writer Kim Crawley, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From airgapping to phreaking to zombie malware, grasping the terminology is crucial to understanding hacker culture and history.If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and surprising facts about familiar cultural touchstones.Understand the relationship between hacker culture and cybersecurityGet to know the ideas behind the hacker ethos, like "e;knowledge should be free"e;Explore topics and publications central to hacker culture, including 2600 MagazineAppreciate the history of cybersecurityLearn about key figures in the history of hacker cultureUnderstand the difference between hackers and cybercriminals

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Kim Crawley has been a cybersecurity researcher and writer for well over a decade. She authored 8 Steps to Better Security, and co-authored The Pentester Blueprint, both with strongly positive reviews on Amazon and Goodreads. She was also featured in the first volume of Marcus J. Carey and Jennifer Jin's Tribe of Hackers. Her magazine articles and blogs have appeared in 2600 Magazine, CIO Magazine, Sophos Naked Security, AT&T Cybersecurity's blog, Infosecurity Magazine, Hack The Box, and too many other places to name here. Recently, she has given talks about penetration testing and hacker culture at SANS PenTest HackFest and Wild West Hackin' Fest. In her spare time, Kim enjoys playing JRPG video games, listening to goth, progressive, jazz, and funk music, cuddling her teddy bears, watching anime, astrology, being a pedantic know-it-all, looking at Lake Ontario from her condo in Toronto, and spending time with her metalhead partner, Jay.