Search:

Low tech hacking : street smarts for security professionals / by Wiles, Jack.; Gudaitis, Terry.; Jabbusch, Jennifer.; Rogers, Russ.; Lowther, Sean.;
Includes bibliographical references and index.Social engineering: the ultimate low tech hacking threat -- Low tech vulnerabilities: physical security -- More about locks and ways to low tech hack them -- Low tech wireless hacking -- Low tech targeting and surveillance: how much could they find out about you? -- Low tech hacking for the penetration tester -- Low tech hacking and the law: where can you go for help? -- Information security awareness training: your most valuable countermeasure to employee risk.
Subjects: Computer security.; Computer hackers.;
© c2012., Syngress,
Available copies: 1 / Total copies: 1
unAPI

Hacking and hackers / by Haerens, Margaret.; Zott, Lynn M.(Lynn Marie),1969-;
Includes bibliographical references and index.What is the most effective way to combat hacking? -- Is hacktivism a serious threat? -- What is the significance of Wikileaks? -- What is the role of government in hacking?Presents a collection of essays that examine different points of view about hacking, covering such topics as cybersecurity, hacktivism, the WikiLeaks scandal, and governmental response to cyberwarfare.
Subjects: Computer crimes.; Hackers.; Hacktivism.;
© [2014], Greenhaven Press,
Available copies: 1 / Total copies: 1
unAPI

Collateral damage [sound recording] / by Michaels, Fern.; Merlington, Laural.nrt;
Read by Laural Merlington.Through all their adventures, the bond of the Sisterhood has remained steadfast and unshakeable. But for the first time, the Sisterhood verges on falling apart when the ladies have to choose between two difficult assignments. The first job guarantees a huge paycheck; the second offers a presidential pardon, and a chance to finally emerge from hiding.
Subjects: Suspense fiction.; Audiobooks; Female friendship; Computer hackers;
© p2008., Brilliance Audio,
Available copies: 1 / Total copies: 1
unAPI

Hacked : a radical approach to hacker culture and crime / by Steinmetz, Kevin F.;
Includes bibliographical references and index.Public discourse, from pop culture to political rhetoric, portrays the figure of the hacker distinctly: a deceptive, digital villain. But what do we actually know about hackers? In Hacked, Kevin F. Steinmetz explores what it means to be a hacker and the nuances of hacker culture. Through extensive interviews with hackers, observations of hacker communities, and analyses of hacker cultural products, Steinmetz demystifies the figure of the hacker and situates the practice of hacking within larger political and economic structures of capitalism, crime, and control. This captivating book challenges many of the common narratives of hackers, suggesting that not all forms of hacking are criminal and, contrary to popular opinion, the broader hacker community actually plays a vital role in our information economy. Hacked thus explores how governments, corporations, and other institutions attempt to manage hacker culture through the creation of ideologies and laws that protect powerful economic interests. Not content to simply critique the situation, Steinmetz ends his work by providing actionable policy recommendations that aim to redirect focus from the individual to corporations, governments, and broader social issues. A compelling study, Hacked helps us understand not just the figure of the hacker but also digital crime and social control in our high-tech society.-- Back cover.Acknowledgments -- Introduction: toward a radical criminology of hackers -- Setting the stage -- The front end of hacking -- Craft(y)ness -- On authority and protocol -- The radical turn -- The (hack) mode of production -- Crafting a crackdown -- Conclusion -- Appendix: field research lists -- Notes -- References -- Index -- About the author.
Subjects: Computer crimes; Computer crimes; Hackers.;
Available copies: 1 / Total copies: 1
unAPI

The girl who played with fire [sound recording] / by Larsson, Stieg,1954-2004.; Keeland, Reg,1943-; Vance, Simon.;
Read by Simon Vance.Mikael Blomkvist, crusading journalist and publisher of the magazine Millennium, has decided to publish a story exposing an extensive sex trafficking operation between Eastern Europe and Sweden, implicating well-known and highly placed members of Swedish society, business, and government.
Subjects: Audiobooks.; Suspense fiction.; Periodical editors; Computer hackers; Human trafficking;
© p2009., Random House,
Available copies: 1 / Total copies: 1
unAPI

Hackers / by Levy, Steven.;
Includes bibliographical references (p. [479]-483) and index.pt. I. True hackers : Cambridge : the fifties and sixties -- pt. II. Hardware hackers : Northern California : the seventies -- pt. III: Game hackers : the Sierras: the eighties -- pt. IV. The last of true hackers : Cambridge : 1983."This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers---those brilliant and eccentric nerds from the late 1950s through the early 8̀0s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers." "Levy profiles the imaginative brainiacs who found clever and unorthodox solutions to computer engineering problems. They had a shared sense of values, known as "the Hacker Ethic," that still thrives today. Hackers captures a seminal period in recent history when underground activities blazed a trail for today's digital world, from MIT students finagling access to clunky computer-card machines to the DIY culture that spawned the Altair and the Apple II." "If you want to change the world in some big way, that's where you should start---biological molecules. Those are all pretty deep problems that need the same type of crazy fanaticism of youthful genius and naiveté that drove the PC industry, and can have the same impact on the human condition."---Bill Gates, Bill and Melinda Gates Foundation"--BOOK JACKET.
Subjects: Computer programming.; Computer engineering.; Computer hackers.; Artificial intelligence; Geeks (Computer enthusiasts);
© c2010., O'Reilly Media,
Available copies: 1 / Total copies: 1
unAPI

Industry of anonymity : inside the business of cybercrime / by Lusthaus, Jonathan,1984-;
Includes bibliographical references (pages 253-277) and index.Introduction -- From lone wolves to industrialization -- Making sense of the cybercrime industry -- Nicknames and identity -- How cybercriminals cooperate online -- The offline dimension -- Cybercrime, organized crime, and governance -- Conclusion.Jonathan Lusthaus lifts the veil on cybercriminals in the most extensive account yet of the lives they lead and the vast international industry they have created. Having traveled to hotspots around the world to meet with hundreds of law enforcement agents, security gurus, hackers, and criminals, he charts how this industry based on anonymity works.--
Subjects: Computer crimes.; Hackers.; Online identities.; Organized crime.;
Available copies: 1 / Total copies: 1
unAPI

This machine kills secrets : how WikiLeakers, cypherpunks and hacktivists aim to free the world's information / by Greenberg, Andy.;
An analysis of how "cypherpunk" innovators of the digital generation are safeguarding individual anonymity while sharing institutional secrets for public use chronicles the activities of such controversial figures as Julian Assange and Daniel Domscheit-Berg.Includes bibliographical references (p. 325-356) and index.The whistleblowers -- The cryptographers -- The cypherpunks -- The onion routers -- The plumbers -- The globalizers -- The engineers.The machine that kills secrets is a powerful cryptographic code that hides the identities of leakers and hacktivists as they spill the private files of government agencies and corporations bringing us into a new age of whistle blowing. With unrivaled access to figures like Julian Assange, Daniel Domscheit-Berg, and Jacob Applebaum, investigative journalist Andy Greenberg unveils the group that brought the world WikiLeaks, OpenLeaks, and BalkanLeaks.This powerful technology has been evolving for decades in the hands of hackers and radical activists, from the libertarian enclaves of Northern California to Berlin to the Balkans. And the secret-killing machine continues to evolve beyond WikiLeaks, as a movement of hacktivists aims to obliterate the world's institutional secrecy. Never have the seemingly powerless had so much power to disembowel big corporations and big government. -- Publisher description
Subjects: Computer hackers; Secrecy.; Official secrets.; Whistle blowing.; Computer crimes.;
© c2012., Dutton,
Available copies: 1 / Total copies: 1
unAPI

Coding freedom : the ethics and aesthetics of hacking / by Coleman, E. Gabriella,1973-;
Includes bibliographical references (pages 225-247) and index.Introduction : The tale of two worlds -- Part I. Histories : The life of a free software hacker -- A tale of two legal regimes -- Part II. Codes of value : The craft and craftiness of hacking -- Two ethical movements in Debian -- Part III. The politics of avowel and disavowel : Code is speech -- Conclusion : The cultural critique of intellectual property law -- Epilogue : How to proliferate distinctions, not destroy them."Who are computer hackers? What is free software? And what does the emergence of a community dedicated to the production of free and open source software--and to hacking as a technical, aesthetic, and moral project--reveal about the values of contemporary liberalism? Exploring the rise and political significance of the free and open source software (F/OSS) movement in the United States and Europe, Coding Freedom details the ethics behind hackers' devotion to F/OSS, the social codes that guide its production, and the political struggles through which hackers question the scope and direction of copyright and patent law. In telling the story of the F/OSS movement, the book unfolds a broader narrative involving computing, the politics of access, and intellectual property. E. Gabriella Coleman tracks the ways in which hackers collaborate and examines passionate manifestos, hacker humor, free software project governance, and festive hacker conferences. Looking at the ways that hackers sustain their productive freedom, Coleman shows that these activists, driven by a commitment to their work, reformulate key ideals including free speech, transparency, and meritocracy, and refuse restrictive intellectual protections. Coleman demonstrates how hacking, so often marginalized or misunderstood, sheds light on the continuing relevance of liberalism in online collaboration."--Back cover.
Subjects: Hackers.; Computer programmers.; Computer programming; Computer programming; Intellectual freedom.;
© ©2013., Princeton University Press,
Available copies: 1 / Total copies: 1
unAPI

The girl who played with fire / by Larsson, Stieg,1954-2004.; Keeland, Reg,1943-;
On the eve of publisher Mikael Blomkvist's story about sex trafficking between Eastern Europe and Sweden, two investigating reporters are murdered. And even more shocking for Mikael Blomkvist: the fingerprints found on the murder weapon belong to Lisbeth Salander--the troubled, wise-beyond-her-years genius hacker who came to his aid years before.
Subjects: Suspense fiction.; Human trafficking; Journalists; Computer hackers; Murder;
© 2010., Vintage Books,
Available copies: 1 / Total copies: 1
unAPI