Available Formats:
-
Running Time: 11:18 hrsNarrator: Jen JaydenPublisher:Ascent Audio, 2024
-
Accessibility:
- Heading navigation
Certified Accessible By: National Network for Equitable Library ServiceRunning Time: 11:18 hrsNarrator: Jen JaydenPublisher:BC Libraries Cooperative, 2024Note: This book was produced with support from the Government of Canada's Social Development Partnerships Program - Disability Component.
Details:
- Author: Crawley, Kim.Contributor: Jayden, Jen.Edition: UnabridgedDate:Created2024Summary:
Hacker culture can be esoteric, but this entertaining reference is here to help. Written by a longtime hacker, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From phreaking to deepfakes, and from APT (advanced package tool) to zombie malware, grasping the terminology is crucial to understanding hacker culture and history. This book from Kim Crawley (8 Steps to Better Security) is written in a conversational style and organized from A to Z. If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and some perhaps surprising facts about familiar cultural touchstones. This book will help you understand the relationship between hacker culture and cybersecurity; get to know the ideas behind the hacker ethos, like "knowledge should be free"; explore topics and publications central to hacker culture, from 2600 Magazine to Cult of the Dead Cow; appreciate the history of cybersecurity; learn about key figures in the history of hacker culture; and understand the difference between hackers and cybercriminals.
Subject(s): Computer security | HackingOriginal Publisher: Rego Park, Ascent AudioLanguage(s): EnglishISBN: 9781663732552
- Log in to post comments