Hacker Culture A to Z: A Fun Guide to the People, Ideas, and Gadgets That Made the Tech World 1st Edition 267938

Паперова книга
267938
Hacker Culture A to Z: A Fun Guide to the People, Ideas, and Gadgets That Made the Tech World 1st Edition - фото 1
  • ISBN
    978-1098145675
  • Видавництво
  • Автор
  • Рік
    2024
  • Мова
    Англійська
  • Ілюстрації
    Чорно-білі
1'700
1 людина
Купити

Все про “Hacker Culture A to Z: A Fun Guide to the People, Ideas, and Gadgets That Made the Tech World 1st Edition”

Від видавця

Hacker culture can be esoteric, but this entertaining reference is here to help. Written by longtime cybersecurity researcher and writer Kim Crawley, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From airgapping to phreaking to zombie malware, grasping the terminology is crucial to understanding hacker culture and history.
If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and surprising facts about familiar cultural touchstones.
  • Understand the relationship between hacker culture and cybersecurity
  • Get to know the ideas behind the hacker ethos, like "knowledge should be free"A?
  • Explore topics and publications central to hacker culture, including 2600 Magazine
  • Appreciate the history of cybersecurity
  • Learn about key figures in the history of hacker culture
  • Understand the difference between hackers and cybercriminals
About the Author
Kim Crawley has been a cybersecurity researcher and writer for well over a decade. She authored 8 Steps to Better Security, and co-authored The Pentester Blueprint, both with strongly positive reviews on Amazon and Goodreads. She was also featured in the first volume of Marcus J. Carey and Jennifer Jin's Tribe of Hackers.
Her magazine articles and blogs have appeared in 2600 Magazine, CIO Magazine, Sophos Naked Security, AT&T Cybersecurity's blog, Infosecurity Magazine, Hack The Box, and too many other places to name here.

Recently, she has given talks about penetration testing and hacker culture at SANS PenTest HackFest and Wild West Hackin' Fest.
In her spare time, Kim enjoys playing JRPG video games, listening to goth, progressive, jazz, and funk music, cuddling her teddy bears, watching anime, astrology, being a pedantic know-it-all, looking at Lake Ontario from her condo in Toronto, and spending time with her metalhead partner, Jay.

Рецензії

0

Всі характеристики

  • Видавництво
  • Автор
  • Категорія
  • Рік
    2024
  • Сторінок
    292
  • Формат
    165х235 мм
  • Обкладинка
    М'яка
  • Тип паперу
    Офсетний
  • Мова
    Англійська
  • Ілюстрації
    Чорно-білі

Товар входить до категорії

  • Самовивіз з відділень поштових операторів від 45 ₴ - 80 ₴
  • Безкоштовна доставка від 3000 грн
Схожі товари
Кібербезпека. Стратегії атак і оборони
112125
Юрий ДиогенесЭрдаль Озкайя
833 ₴980 ₴
Grokking Web Application Security
277862
Malcolm McDonald
980 ₴
Spring Security in Action, Second Edition 2nd Edition
276052
Laurentiu Spilca
1'100 ₴
Cryptography and Cryptanalysis in Java. 1st Ed.
244673
Stefania Loredana Nita, Marius Iulian Mihailescu
1'500 ₴
Snowflake Security: Securing Your Snowflake Data Cloud. 1st Ed.
244728
Ben Herzberg, Yoav Cohen
1'500 ₴
Ethical Hacking Workshop: Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity
263204
Rishalin PillayMohammed Abutheraa
1'500 ₴
Phishing and Communication Channels. A Guide to Identifying and Mitigating Phishing Attacks. 1st Ed.
244713
Gunikhan Sonowal
1'600 ₴
Security Engineering: A Guide to Building Dependable Distributed Systems
195459
Ross Anderson
1'700 ₴
x86 Software Reverse-Engineering, Cracking, and Counter-Measures
267934
Stephanie DomasChristopher Domas
1'700 ₴
Security Chaos Engineering: Sustaining Resilience in Software and Systems 1st Edition
274007
Kelly ShortridgeAaron Rinehart
1'700 ₴
Zero Trust Networks: Building Secure Systems in Untrusted Network 2nd Edition
275838
Razi RaisChristina MorilloDoug BarthEvan Gilman
1'700 ₴
The Definitive Guide to Security in Jakarta EE. Securing Java-based Enterprise Applications with Jakarta Security, Authorization, Authentication and More. 1st Ed.
244733
Arjan Tijms, Teo Bais, Werner Keil
1'800 ₴
The Reign of Botnets: Defending Against Abuses, Bots and Fraud on the Internet (Tech Today) 1st Edition
280687
David Senecal
1'800 ₴
Cryptography and Cryptanalysis in MATLAB. 1st Ed.
244674
Marius Iulian Mihailescu, Stefania Loredana Nita
1'900 ₴
Windows Security Internals: A Deep Dive into Windows Authentication, Authorization, and Auditing
280690
James Forshaw
1'900 ₴
Kubernetes Security and Observability. A Holistic Approach to Securing Containers and Cloud Native Applications. 1st Ed.
244761
Brendan Creane, Amit Gupta
2'000 ₴
Hacking Kubernetes: Threat-Driven Analysis and Defense. 1st Ed.
244753
Andrew Martin, Michael Hausenblas
2'100 ₴