Hackers and Hacking: A Reference Handbook

Editor/Author Holt, Thomas J. and Schell, Bernadette H.
Publication Year: 2013
Publisher: ABC-CLIO

Single-User Purchase Price: $58.00
Unlimited-User Purchase Price: $87.00
ISBN: 978-1-61-069276-2
Category: Technology & Engineering - Technology
Image Count: 32
Book Status: Available
Table of Contents

This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact.

Share this

This book is found in the following Credo Collections:

Table of Contents

  • List of Figures and Tables
  • Preface
  • 1 Background and History
  • 2 Problems, Controversies, and Solutions
  • 3 Perspectives
  • Protecting Critical Infrastructures (Bob Radvanosky)
  • Examining Social Dynamics and Malware Secrets to Mitigate Net-centric Attacks (Ziming Zhao and G.-J. Ahn)
  • The Role of Nation-States in Cyberattacks (Max Kilger)
  • The Case for Strong Data Breach Notification Legislation (Douglas E. Salane)
  • A Criminologist's Perspective on the Implications of Criminological Research for Policies and Practices Aimed at Addressing Hacking and Malware Infection (Adam M. Bossler)
  • Hacking and Criminality (Nathan Fisk)
  • The Life Cycle of a Botnet (Aditya K. Sood and Richard J. Enbody)
  • Taking the Fun out of Playtime: Real Crime and Video Games (Rob D'Ovidio, Murugan Anandarajan, and Alex Jenkins)
  • 4 Profiles
  • 5 Data and Documents
  • Anti-Phishing Working Group: Phishing Activity Trends Report, Second Quarter 2012
  • The Malware Domain List
  • Ponemon Institute Study: 2011 Cost of Data Breach Study: United States
  • Symantec: Internet Security Threat Report 2011
  • A Closer Look at Corporate and Governmental Data Theft on a Global Basis: The 2012 Verizon Data Breach Investigations Report
  • The On-Land and Online Real-World Context
  • The Report's Main Findings
  • Report Conclusions
  • References
  • 6 Resources
  • Print: Books
  • Print: Magazines, White Papers, News, and Downloadable Articles
  • Nonprint: Hacking Websites
  • Nonprint: Hacking-Related Films and Learn How-to-Hack Videos
  • Nonprint: Websites of Companies Offering Antivirus Software
  • Nonprint: Websites of Companies Offering Firewalls
  • Nonprint: Websites of Companies Offering Intrusion-Detection Systems
  • Nonprint: U.S. Government Agencies and Independent Organizations Fighting Malicious Hacking
  • 7 Chronology
  • Prehistory (1800s–1969)
  • 1815 to Mid-1800s
  • 1920s–1950s
  • The Elder Days (1970–1979)
  • The Golden Age (1980–1989)
  • The Great Hacker Wars and Hacker Activism (1990–2000)
  • Fear of a Cyber-Apocalypse Era (2001–Present)
  • Glossary
  • About the Authors