The comprehensive hacker dictionary for security professionals, businesses, governments, legal professionals, and others dealing with cyberspace Hackers. Crackers. Phreakers. Black hats. White hats. Cybercrime. Logfiles. Anonymous Digital Cash. ARP Redirect. Cyberspace has a language all its own. Understanding it is vital if you're concerned about Internet security, national security, or even personal security. As recent events have proven, you don't have to own a computer to be the victim of cybercrime-crackers have accessed information in the records of large, respected organizations, institutions, and even the military. This is your guide to understanding hacker terminology. It's up to date and comprehensive, with: Clear, concise, and accurate definitions of more than 875 hacker terms Entries spanning key information-technology security concepts, organizations, case studies, laws, theories, and tools Entries covering general terms, legal terms, legal cases, and people Suggested further reading for definitions This unique book provides a chronology of hacker-related developments beginning with the advent of the computer and continuing through current events in what is identified as today's Fear of a Cyber-Apocalypse Era. An appendix entitled "How Do Hackers Break into Computers?" details some of the ways crackers access and steal information. Knowledge is power. With this dictionary, you're better equipped to be a white hat and guard against cybercrime.
"Sinopsis" puede pertenecer a otra edición de este libro.
Bernadette H. Schell is dean of the Faculty of Business and Information Technology at Ontario's only laptop university, the University of Ontario Institute of Technology in Oshawa, Ontario, Canada. Dr. Schell is the 2000 recipient of the University Research Excellence Award from Laurentian University, where she was previously director of the School of Commerce and Administration in Sudbury, Ontario, Canada. Dr. Schell has written numerous journal articles on industrial psychology and cybercrime topics. She has written four books with Quorum Books in Westport, Connecticut, on such topics as organizational and personal stress, corporate leader stress and emotional dysfunction, stalking, and computer hackers. She has also published two books on cybercrime and the impact of the Internet on society with ABC-CLIO in Santa Barbara, California. Clemens Martin is the previous director of IT programs at the Faculty of Business and Information Technology at the University of Ontario Institute of Technology, where he is jointly appointed to the Faculty of Engineering and Applied Science. Before joining this university, Dr. Martin was partner and managing director of an information technology consulting company and Internet Service Provider, based in Neuss, Germany. He was responsible for various security and consulting projects, including the implementation of Java-based health care cards for Taiwanese citizens. Dr. Martin currently holds a Bell University Labs (BUL) research grant in IT Security. He is the coauthor with Dr. Schell of the cybercrime book published by ABC-CLIO in Santa Barbara, California.
The comprehensive hacker dictionary for security professionals, businesses, governments, legal professionals, and others dealing with cyberspace
Hackers. Crackers. Phreakers. Black hats. White hats. Cybercrime. Logfiles. Anonymous Digital Cash. ARP Redirect.
Cyberspace has a language all its own. Understanding it is vital if you're concerned about Internet security, national security, or even personal security. As recent events have proven, you don't have to own a computer to be the victim of cybercrime crackers have accessed information in the records of large, respected organizations, institutions, and even the military.
This is your guide to understanding hacker terminology. It's up to date and comprehensive, with:
This unique book provides a chronology of hacker-related developments beginning with the advent of the computer and continuing through current events in what is identified as today's Fear of a Cyber-Apocalypse Era. An appendix entitled "How Do Hackers Break into Computers?" details some of the ways crackers access and steal information.
Knowledge is power. With this dictionary, you're better equipped to be a white hat and guard against cybercrime.
"Sobre este título" puede pertenecer a otra edición de este libro.
Librería: World of Books (was SecondSale), Montgomery, IL, Estados Unidos de America
Condición: Very Good. Item in very good condition! Textbooks may not include supplemental items i.e. CDs, access codes etc. Nº de ref. del artículo: 00085535895
Cantidad disponible: 1 disponibles
Librería: ThriftBooks-Dallas, Dallas, TX, Estados Unidos de America
Paperback. Condición: Fair. No Jacket. Readable copy. Pages may have considerable notes/highlighting. ~ ThriftBooks: Read More, Spend Less. Nº de ref. del artículo: G0470047526I5N00
Cantidad disponible: 1 disponibles
Librería: Big River Books, Powder Springs, GA, Estados Unidos de America
Condición: good. This book is in good condition. The cover has minor creases or bends. The binding is tight and pages are intact. Some pages may have writing or highlighting. Nº de ref. del artículo: BRV.0470047526.G
Cantidad disponible: 1 disponibles
Librería: Toscana Books, AUSTIN, TX, Estados Unidos de America
Paperback. Condición: new. Excellent Condition.Excels in customer satisfaction, prompt replies, and quality checks. Nº de ref. del artículo: Scanned0470047526
Cantidad disponible: 1 disponibles
Librería: BennettBooksLtd, San Diego, NV, Estados Unidos de America
paperback. Condición: New. In shrink wrap. Looks like an interesting title! Nº de ref. del artículo: Q-0470047526
Cantidad disponible: 1 disponibles