Hacker Culture A to Z: A Fun Guide to the People, Ideas, and Gadgets That Made the Tech World 1st Edition 267938

Паперова книга
Hacker Culture A to Z: A Fun Guide to the People, Ideas, and Gadgets That Made the Tech World 1st Edition - фото 1
  • ISBN
  • Видавництво
  • Автор
  • Рік
  • Мова
  • Ілюстрації
1 людина

Все про “Hacker Culture A to Z: A Fun Guide to the People, Ideas, and Gadgets That Made the Tech World 1st Edition”

Від видавця

Hacker culture can be esoteric, but this entertaining reference is here to help. Written by longtime cybersecurity researcher and writer Kim Crawley, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From airgapping to phreaking to zombie malware, grasping the terminology is crucial to understanding hacker culture and history.
If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and surprising facts about familiar cultural touchstones.
  • Understand the relationship between hacker culture and cybersecurity
  • Get to know the ideas behind the hacker ethos, like "knowledge should be free"A?
  • Explore topics and publications central to hacker culture, including 2600 Magazine
  • Appreciate the history of cybersecurity
  • Learn about key figures in the history of hacker culture
  • Understand the difference between hackers and cybercriminals
About the Author
Kim Crawley has been a cybersecurity researcher and writer for well over a decade. She authored 8 Steps to Better Security, and co-authored The Pentester Blueprint, both with strongly positive reviews on Amazon and Goodreads. She was also featured in the first volume of Marcus J. Carey and Jennifer Jin's Tribe of Hackers.
Her magazine articles and blogs have appeared in 2600 Magazine, CIO Magazine, Sophos Naked Security, AT&T Cybersecurity's blog, Infosecurity Magazine, Hack The Box, and too many other places to name here.

Recently, she has given talks about penetration testing and hacker culture at SANS PenTest HackFest and Wild West Hackin' Fest.
In her spare time, Kim enjoys playing JRPG video games, listening to goth, progressive, jazz, and funk music, cuddling her teddy bears, watching anime, astrology, being a pedantic know-it-all, looking at Lake Ontario from her condo in Toronto, and spending time with her metalhead partner, Jay.



Всі характеристики

  • Видавництво
  • Автор
  • Категорія
  • Рік
  • Сторінок
  • Формат
    165х235 мм
  • Обкладинка
  • Тип паперу
  • Мова
  • Ілюстрації

Товар входить до категорії

  • Самовивіз з відділень поштових операторів від 45 ₴ - 80 ₴
  • Безкоштовна доставка від 3000 грн
Схожі товари
Кібербезпека. Стратегії атак і оборони
Юрий ДиогенесЭрдаль Озкайя
833 ₴980 ₴
Grokking Web Application Security
Malcolm McDonald
980 ₴
Spring Security in Action, Second Edition 2nd Edition
Laurentiu Spilca
1'100 ₴
Cryptography and Cryptanalysis in Java. 1st Ed.
Stefania Loredana Nita, Marius Iulian Mihailescu
1'500 ₴
Snowflake Security: Securing Your Snowflake Data Cloud. 1st Ed.
Ben Herzberg, Yoav Cohen
1'500 ₴
Ethical Hacking Workshop: Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
Rishalin PillayMohammed Abutheraa
1'500 ₴
Phishing and Communication Channels. A Guide to Identifying and Mitigating Phishing Attacks. 1st Ed.
Gunikhan Sonowal
1'600 ₴
Security Engineering: A Guide to Building Dependable Distributed Systems
Ross Anderson
1'700 ₴
x86 Software Reverse-Engineering, Cracking, and Counter-Measures
Stephanie DomasChristopher Domas
1'700 ₴
Security Chaos Engineering: Sustaining Resilience in Software and Systems 1st Edition
Kelly ShortridgeAaron Rinehart
1'700 ₴
Zero Trust Networks: Building Secure Systems in Untrusted Network 2nd Edition
Razi RaisChristina MorilloDoug BarthEvan Gilman
1'700 ₴
The Definitive Guide to Security in Jakarta EE. Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More. 1st Ed.
Arjan Tijms, Teo Bais, Werner Keil
1'800 ₴
The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet (Tech Today) 1st Edition
David Senecal
1'800 ₴
Cryptography and Cryptanalysis in MATLAB. 1st Ed.
Marius Iulian Mihailescu, Stefania Loredana Nita
1'900 ₴
Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing
James Forshaw
1'900 ₴
Kubernetes Security and Observability. A Holistic Approach to Securing Containers and Cloud Native Applications. 1st Ed.
Brendan Creane, Amit Gupta
2'000 ₴
Hacking Kubernetes: Threat-Driven Analysis and Defense. 1st Ed.
Andrew Martin, Michael Hausenblas
2'100 ₴