LDR | | 03412cmm uu200553Ki 4500 |
001 | | 000000305698 |
005 | | 20230525101250 |
006 | | m o d |
007 | | cr cnu---unuuu |
008 | | 131021s2013 caua ob 001 0 eng d |
020 | |
▼a 9781610692779 (electronic bk.) |
020 | |
▼a 1610692772 (electronic bk.) |
020 | |
▼z 9781610692762 |
020 | |
▼z 1610692764 |
035 | |
▼a (OCoLC)861199797 |
040 | |
▼a N$T
▼b eng
▼e rda
▼e pn
▼c N$T
▼d IDEBK
▼d YDXCP
▼d CDX
▼d TEFOD
▼d OCLCA
▼d 248032 |
049 | |
▼a K4RA |
050 | 4 |
▼a HV6773
▼b .H65 2013eb |
072 | 7 |
▼a SOC
▼x 004000
▼2 bisacsh |
082 | 04 |
▼a 364.16/8
▼2 23 |
100 | 1 |
▼a Holt, Thomas J.,
▼d 1978- |
245 | 10 |
▼a Hackers and hacking :
▼b a reference handbook /
▼c Thomas J. Holt and Bernadette H. Schell. |
264 | 1 |
▼a Santa Barbara, California :
▼b ABC-CLIO, LLC,
▼c [2013] |
300 | |
▼a 1 online resource (xx, 354 pages) :
▼b illustrations. |
336 | |
▼a text
▼b txt
▼2 rdacontent |
337 | |
▼a computer
▼b c
▼2 rdamedia |
338 | |
▼a online resource
▼b cr
▼2 rdacarrier |
490 | 1 |
▼a Contemporary world issues |
504 | |
▼a Includes bibliographical references and index. |
520 | |
▼a "This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact. What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day. Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraud--acts that can have devastating effects upon our modern information society." -- Publisher's website. |
588 | |
▼a Description based on print version record. |
650 | 0 |
▼a Hackers. |
650 | 0 |
▼a Computer crimes. |
650 | 0 |
▼a Computer security. |
650 | 0 |
▼a Internet
▼x Moral and ethical aspects. |
650 | 7 |
▼a Computer crimes.
▼2 fast
▼0 (OCoLC)fst00872063 |
650 | 7 |
▼a Computer hackers.
▼2 fast
▼0 (OCoLC)fst00872150 |
650 | 7 |
▼a Computer security.
▼2 fast
▼0 (OCoLC)fst00872484 |
650 | 7 |
▼a Internet
▼x Moral and ethical aspects.
▼2 fast
▼0 (OCoLC)fst01766714 |
650 | 7 |
▼a SOCIAL SCIENCE / Criminology.
▼2 bisacsh |
655 | 4 |
▼a Electronic books. |
700 | 1 |
▼a Schell, Bernadette H.
▼q (Bernadette Hlubik),
▼d 1952- |
776 | 08 |
▼i Print version:
▼a Holt, Thomas J., 1978-
▼t Hackers and hacking
▼z 9781610692762
▼w (DLC) 2013007935
▼w (OCoLC)821025026 |
830 | 0 |
▼a Contemporary world issues. |
856 | 40 |
▼3 EBSCOhost
▼u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=652674 |
938 | |
▼a EBSCOhost
▼b EBSC
▼n 652674 |
938 | |
▼a Ingram Digital eBook Collection
▼b IDEB
▼n cis26433777 |
938 | |
▼a YBP Library Services
▼b YANK
▼n 11254639 |
938 | |
▼a Coutts Information Services
▼b COUT
▼n 26433777 |
990 | |
▼a 관리자 |