reklama - zainteresowany?

Hacker Culture A to Z - Helion

Hacker Culture A to Z
ebook
Autor: Kim Crawley
ISBN: 9781098145637
stron: 294, Format: ebook
Data wydania: 2023-11-06
Księgarnia: Helion

Cena książki: 152,15 zł (poprzednio: 176,92 zł)
Oszczędzasz: 14% (-24,77 zł)

Dodaj do koszyka Hacker Culture A to Z

Hacker culture can be esoteric, but this entertaining reference is here to help. Written by longtime cybersecurity researcher and writer Kim Crawley, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From airgapping to phreaking to zombie malware, grasping the terminology is crucial to understanding hacker culture and history.

If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and surprising facts about familiar cultural touchstones.

  • Understand the relationship between hacker culture and cybersecurity
  • Get to know the ideas behind the hacker ethos, like "knowledge should be free"
  • Explore topics and publications central to hacker culture, including 2600 Magazine
  • Appreciate the history of cybersecurity
  • Learn about key figures in the history of hacker culture
  • Understand the difference between hackers and cybercriminals

Dodaj do koszyka Hacker Culture A to Z

 

Osoby które kupowały "Hacker Culture A to Z", wybierały także:

  • Windows Media Center. Domowe centrum rozrywki
  • Ruby on Rails. Ćwiczenia
  • DevOps w praktyce. Kurs video. Jenkins, Ansible, Terraform i Docker
  • Przywództwo w Å›wiecie VUCA. Jak być skutecznym liderem w niepewnym Å›rodowisku
  • Scrum. O zwinnym zarzÄ…dzaniu projektami. Wydanie II rozszerzone

Dodaj do koszyka Hacker Culture A to Z

Spis treści

Hacker Culture A to Z eBook -- spis treści

  • Preface
    • Conventions Used in This Book
    • OReilly Online Learning
    • How to Contact Us
    • Acknowledgments
  • 1. A
    • Abacus
    • Abandonware
    • Activision
    • Adleman, Leonard
    • Advanced persistent threat (APT)
    • Agile methodology
    • Airgapping
    • Akihabara, Tokyo
    • Alderson, Elliot
    • Alphabet Inc.
    • Amazon Web Services (AWS)
    • AMD (Advanced Micro Devices)
    • Amiga
    • Android operating system
    • Anonymous
    • Apache/Apache License
    • Apple
    • ARM (Advanced RISC Machines)
    • ARPAnet
    • Artificial intelligence (AI)
    • Assange, Julian
    • Assembly
    • Atari
    • Atlus
    • Augmented and virtual reality
    • Autistic
    • AWS
    • Azure
  • 2. B
    • Babbage, Charles
    • Baer, Ralph
    • bash
    • BASIC
    • BBS
    • Bell Labs
    • Berkeley, University of California
    • Berners-Lee, Tim
    • Binary
    • BitTorrent
    • Blockchain
    • Botnet
    • Bug
    • Bulletin board systems (BBSes)
    • Byte magazine
  • 3. C
    • Calce, Michael MafiaBoy
    • Cama, Amat
    • Captain Crunch (John Draper)
    • Capture the Flag
    • Carnegie Mellon University
    • Carr, Iris
    • The Cathedral and the Bazaar (1999 book)
    • Certificates (cryptography)
    • Certificates (professional credentials)
    • ChatGPT
    • CIA (Central Intelligence Agency)
    • CIA triad (confidentiality, integrity, availability)
    • CISSP
    • C languages
    • Cleartext
    • Closed source software
    • Cloud
    • Comic-Con
    • Commodore
    • Common Vulnerabilities and Exposures (CVE)
    • Consumer Electronics Show (CES)
    • Copyleft
    • CPU (Central processing unit)
    • Cray, Seymour
    • Creative Commons licenses
    • Crunch time
    • Cryptocurrency
    • Cryptography
    • Cult of the Dead Cow (cDc)
    • Cyberpunk
    • Cybersecurity
  • 4. D
    • Dark.Fail
    • Dark Web/darknet
    • DARPA (Defense Advanced Research Projects Agency)
    • Data
    • Da Vinci, Leonardo
    • Debian
    • DEC (Digital Equipment Corporation)
    • Deep Web
    • DEF CON
    • Demoscene
    • Denial-of-service (DoS, DDoS) attacks
    • Developers
    • DevOps
    • Diffie, Whitfield
    • Diffie-Hellman key exchange
    • Disk, disc
    • DOOM (video game)
    • DOS (Disk Operating System)
    • Draper, John
    • Dread forums
    • DRM (Digital Rights Management)
    • Dungeons & Dragons (game franchise)
  • 5. E
    • Electronic Arts
    • Electronic Entertainment Expo (E3)
    • Electronic Frontier Foundation (EFF)
    • Electronics
    • Emacs
    • Email
    • ENIAC (Electronic Numerical Integrator and Computer)
    • Enigma
    • Ethical hacking
    • Exploit
  • 6. F
    • Facebook
    • Fairchild Semiconductor
    • Floppy disk
    • Form factor
    • Freenet
    • Free Software Foundation (FSF)
    • Freeware
    • FUD
  • 7. G
    • Game Developers Conference (GDC)
    • Gates, Bill
    • Gibson, William
    • Git/GitHub
    • GNOME
    • GNU (software collection)
    • Go
    • Goldstein, Emmanuel
    • Google
    • Google Cloud Platform (GCP)
    • Governance
    • Graphical user interface (GUI)
  • 8. H
    • Hacker
    • Hackers (1995 film)
    • Hackers: Heroes of the Computer Revolution (2010 book)
    • Hackers on Planet Earth (HOPE)
    • Hacking Is Not a Crime
    • Hack the Box
    • Hacktivism
    • Hak5
    • Ham radio
    • Hardware
    • Hellman, Martin
    • Hello World
    • Hewlett-Packard (HP)
    • Hexadecimal numbering
    • Hidden Figures (2017 film)
    • Homebrew Computer Club
    • Hopper, Grace
    • HTML (HyperText Markup Language)
  • 9. I
    • IBM
    • Indian Institute of Engineering Science and Technology (IIEST); Indian Institutes of Technology (IIT)
    • Industrial control systems
    • Integrated development environment (IDE)
    • Intel
    • Intellectual property
    • Internet
    • Invisible Internet Project (I2P)
    • IRC (Internet Relay Chat)
  • 10. J
    • Jack, Barnaby
    • Jackson, Mary
    • Java
    • JavaScript
    • Jobs, Steve
    • Johnson, Katherine Coleman
    • Joy, Bill
  • 11. K
    • Kali Linux
    • Key
    • Keyboard
  • 12. L
    • Lamarr, Hedy
    • Larsson, Stieg
    • Lawson, Jerry
    • Levy, Steven
    • Linux
    • Lovelace, Ada
    • LulzSec
  • 13. M
    • Macintosh
    • macOS
    • Malware
    • Manning, Chelsea
    • Massachusetts Institute of Technology (MIT)
    • Meta
    • Metasploit Framework
    • Microcomputers
    • Microsoft
    • Minicomputers
    • Mitnick, Kevin
    • Miyamoto, Shigeru
    • MMO (Massively Multiplayer Online) games
    • Moores law
    • Morse code
    • Mr. Robot (TV show)
    • MS-DOS (Microsoft Disk Operating System)
    • Multics
  • 14. N
    • Napster
    • National Air and Space Administration (NASA)
    • National Security Agency (NSA)
    • Networking
    • NeXT Computer
    • Nihon Falcom
    • Nintendo
    • Nonfungible tokens (NFTs)
    • NVIDIA
  • 15. O
    • OpenAI
    • Open source
    • Open Worldwide Application Security Project (OWASP)
    • Operating systems
    • Operational security
  • 16. P
    • Packet switching
    • Page, Larry
    • PEBKAC
    • Peer-to-peer (P2P) networks
    • Penetration testing
    • PGP
    • Personal computers
    • Phishing
    • Phreaking
    • Ping
    • Piracy
    • Pirate Bay/Pirate Party
    • Pirates of Silicon Valley (1999 film)
    • Pizza
    • Pretty Good Privacy (PGP)
    • Programming
    • Proprietary software
    • Proxy networks
    • Python
  • 17. Q
    • Quantum computing
  • 18. R
    • Radio
    • RadioShack
    • Ramachandran, Vivek
    • Ransomware
    • Raspberry Pi
    • README files
    • Reddit
    • Red Hat
    • Ritchie, Dennis
    • Rivest, Ron
    • Rivest-Shamir-Adleman (RSA) cryptography
    • Robotics
    • Roleplaying games (RPGs)
  • 19. S
    • Sakura, Futaba
    • Salander, Lisbeth
    • SCADA (Supervisory control and data acquisition)
    • Schneier, Bruce
    • Script kiddie
    • Search engines
    • Sega
    • Semiconductors
    • Shamir, Adi
    • Shareware/freeware/abandonware
    • Signal (messaging app)
    • Silicon Valley
    • Silk Road
    • Smartphone
    • Snowden, Edward
    • Social media
    • Spyware
    • Stallman, Richard
    • Stanford University
    • Startups
    • Steam
    • Stuxnet
    • Sun Microsystems
    • Supercomputers
    • Swartz, Aaron
    • Syntax
  • 20. T
    • TCP/IP (Transmission Control Protocol/Internet Protocol)
    • Tech Model Railroad Club
    • Telephones
    • Texas Instruments
    • Thompson, Ken
    • Threat actor
    • Timesharing
    • Tokyo Denki University
    • Tor (The Onion Router)
    • Torvalds, Linus
    • Tramiel, Jack
    • Transistor
    • Tribe of Hackers
    • Turing, Alan
    • 2600 (Twenty-Six Hundred): The Hacker Quarterly (magazine)
    • Twitter
  • 21. U
    • UNIX
    • Unreal Engine
    • Usenet
  • 22. V
    • Valve
    • Vaughan, Dorothy
    • Version control
    • vi
    • Video games
    • Virtual reality (VR)
    • Virus
    • VisiCalc
  • 23. W
    • Wardialing
    • Wardriving
    • WarGames (1983 film)
    • Watch_Dogs (video game series)
    • Waterloo, University of
    • Whiteboard interviews
    • Whitehat hackers
    • WiFi
    • WikiLeaks
    • Wikipedia
    • Windows
    • WIRED magazine
    • World War II
    • World Wide Web
    • World Wide Web Consortium (W3C)
    • Worm
    • Wozniak, Steve
    • WYSIWYG
  • 24. X
    • Xbox
    • Xerox
    • Xfce
    • Xiao Tian
  • 25. Y
    • Yahoo!
    • Y Combinator
  • 26. Z
    • Zero day
    • Zettabyte Era
    • Zork
    • Zuckerberg, Mark

Dodaj do koszyka Hacker Culture A to Z

Code, Publish & WebDesing by CATALIST.com.pl



(c) 2005-2024 CATALIST agencja interaktywna, znaki firmowe należą do wydawnictwa Helion S.A.